RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Prevent ransomware attacks by building layers of defense into your cybersecurity strategy to mitigate the fallout of an infiltration.
Active Directory, Cracking Dictionaries, Password Security
Password hashing is the process of converting a plain-text password into a fixed-length string of characters (called a hash) using a one-way cryptographic algorithm.
Active Directory, Cybersecurity, Enzoic News, Password Security
Enzoic and GuidePoint Security partner to help organizations fight credential-based attacks with real-time password intelligence.
Account Takeover, Credential Screening, Data Breaches, Password Security
Credential leaks are fueling cyberattacks. Learn how credential stuffing works—and how to stop account takeovers before they start.
By protecting the password layer, organizations can prevent the MFA fatigue flood of notifications altogether.
Cybersecurity, Healthcare Cybersecurity, Threat Intel
Why industries continues to struggle with its cybersecurity posture amid rising ransomware attacks, human error, and outdated systems.
Active Directory, Credential Screening, Cybersecurity, Password Security
How authentication works, the difference between 2FA and MFA, and the various types of secondary authentication factors.
Account Takeover, Cybersecurity, FinTech
63% of US cardholders have fallen victim to fraud. One critical area of risk is the exposure of full payment card numbers on the dark web.
Active Directory, Credential Screening, Password Security
Enzoic’s password auditor report highlights the ongoing risks associated with compromised credentials in Active Directory (AD) environments
Cybersecurity, Data Breaches, Identity Breach Monitoring, Threat Intel
A deep dive into some real-live techniques and scripts used by threat actors to commit credit card fraud. See the actual steps involved.
No Spam. Only sweet content and updates on our products and solutions.