Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Account Takeover

,

ATO Attacks from a Threat Intel Perspective

The battle against ATO attacks is one of speed, scale, and sophistication and defenders are dealing with an overwhelming influx of data.

Read More

, , ,

Rethinking Credential Security

Whether you're a CISO or a security professional this Q&A is packed with credential security insights you can implement today.

Read More

, ,

The OpenID Shared Signals Framework

This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together.

Read More

, , ,

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against.

Read More

, , , ,

Achieving CyberSecure Canada Certification

CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls.

Read More

, ,

Disorder in the Court: Unintended Consequences of ATO

The consequences of ATO can range from personal account hijacking to more severe impacts like corporate email breaches.

Read More

, , , , ,

Enzoic Acquires VeriClouds

VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand.

Read More

, , ,

E-commerce Fraud Prevention: Securing Your Business and Trust

Implementing an e-commerce fraud prevention strategy provides businesses with long-term success while providing a secure shopping experience for consumers.

Read More

, , ,

MFA Vulnerabilities, ATO, and the Importance of Password Security

The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective.

Read More