Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Account Takeover

, ,

Understanding Bot Mitigation Limitations

Take a look at the limitations of bot mitigation and read where compromised credential screening can be highly complementary.

Read More

, , ,

Enzoic Wins “Fraud Prevention Innovation of the Year” Award in 2020 CyberSecurity Breakthrough Awards Program

Enzoic is proud to receive the Fraud Prevention Innovation Award. Recognizing our team & the innovative nature of our solution.

Read More

, , ,

Enzoic Wins Colorado Companies to Watch 2020

Enzoic is honored to be named a winner of the 2020 Colorado Companies to Watch for our dedication, care, and influence as a growing business.

Read More

,

Credential Vulnerabilities Most Likely Breach Culprit: Verizon DBIR

Over 80% of hacking-related breaches involved the use of lost or stolen credentials. We analyzed the findings and uncovered some additional data points.

Read More

,

The Threat of Compromised Passwords

Compromised passwords are considered one of the weakest elements in cybersecurity. Why they are such a threat? What can organizations can do about them?

Read More

The New DIBBS Password Format Explained

This is a brief summary of the new DIBBS (DLA Internet Bid Board System) password format changes and the rationale behind some of these changes.

Read More

, , ,

Specialized Threat Intelligence: Breach Data to Defensive Solution

To provide the most effective defense, our compromised credential database is continuously updated to defend against credential stuffing attacks

Read More

,

Employee Account Takeover in the Age of COVID-19

Account takeover during the COVID-19 pandemic: As the threat to our health grows, so do the cyberattacks. Why is this and how can organizations prevent it?

Read More

, , , ,

HIPAA & Employee Password Policies

Hospitals and healthcare providers comply with HIPAA to keep stakeholders secure. But how should employee password policy be handled in light of HIPAA?

Read More