SANS Compromised Credentials

SANS Analyst Program, “Fighting Back Against Compromised Credentials”

Analyst Paper Summary “In our evaluation of Enzoic, we found that it supports all of the must-haves that typical security teams would want.” – Jake Williams, SANS  A recent first look paper written by Jake Williams for the SANS cyber security institute outlines the main issues surrounding compromised credentials and preventative measures companies can take.  In the paper and an accompanying webcast, Williams …

education

Back to School Means More Cyber Concerns

Cyberattacks continue to rise, threatening the educational sector  As the 2022-2023 school year looms, so do ongoing cyber threats directly targeting schools, universities and school district administrations.  In 2021, there were an average of over 1500 attacks on education and research organization per week and these numbers are expected to continue to rise through 2022. The educational sector is massive …

Stolen Credentials

How Stolen Credentials and Ransomware are a Simultaneous Threat

Defending from Both Directions Over the past decade, the cyber landscape has evolved rapidly. But as Mike Wilson points out for Forbes, with every positive change or technological advancement comes several layers of cyber threat, as criminals continue to seek out weaknesses wherever they can.  Each year the Verizon DBIR provides an overall update on current threat trends and provides insight into who …

The Biggest Takeaway from the 2022 Verizon DBIR

The annual Verizon Data Breach Investigations Report (DBIR) contains several useful security insights. Reflecting on another year where cybersecurity attacks have frequently starred in news headlines, the 2022 DBIR confirms a lot of what professionals already know: cyber attacks continue to increase in frequency, and organizations of all sizes need to bolster their defensive postures in order to stay safe.  …

username & password

Username & Password Pairs: Why Banning Just Passwords Isn’t Enough

Password blacklists are receiving considerable attention. It’s clear why: weak and compromised passwords are a factor in nearly all hacking-related cybersecurity breaches. Best practices from NIST require organizations to disallow the use of any common and compromised passwords. And several cyber security companies offer password blacklists for this purpose. But authentication requires a username and password combination, so shouldn’t we …

Identity Management

West-Mark Partnership with Enzoic Wins Award For  “Identity Management Project of the Year – SMB” 

Identity Defined Security Alliance’s “Identity Management Project of the Year – SMB” recognized Enzoic’s customer West-Mark for the results of an initiative that eliminated compromised credentials from their environment. West-Mark, an ISO 9001 certified manufacturer of trucks and trailers, is an essential supplier for the US Department of Defense and the United States military. However, their high-stakes position in the …

white house

A White House Cybersecurity Document Provides Guidance for All Industries

As tensions between the US and Russia escalate, organizations need to act fast to shore up digital defenses     In a just-released briefing from the White House, titled “Act Now to Protect Against Potential Cyberattacks,” authorities urged government facilities, healthcare organizations, and companies of all types, to lock down their digital systems–urgently. Intelligence indicates that Russia may be exploring …