Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Active Directory

, ,

CMMC Password Compliance 101

We’ll cover the basics of CMMC, who needs to comply, what happens if you don’t, how compliance is enforced, and how Enzoic helps address a critical CMMC requirement related to protecting against compromised passwords.

Read More

, , ,

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against.

Read More

, , , ,

Achieving CyberSecure Canada Certification

CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls.

Read More

, , , ,

Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) play an essential role in managing access but they also come with significant security risks.

Read More

, , ,

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

, , ,

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?

Read More

, , ,

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.

Read More