Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Continuous Password Protection

, , , ,

Protecting Public Sector Organizations from the Threat of Compromised Credentials

Enzoic has partnered with CIS CyberMarket to enhance cybersecurity offerings for public sector organizations.

Read More

, , ,

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?

Read More

, , ,

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.

Read More

, , , ,

Insights from IBM’s 2024 Cost of a Data Breach Report

The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year.

Read More

, ,

NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords

NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords.

Read More

, ,

Transforming How MSPs, MSSPs and VARs Protect their Customers

MSPs, MSSPs, tech resellers, in-house, or others need to aid their clients in planning strategies to guard against compromised credentials.

Read More

, , ,

Protect Active Directory Better

Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how.

Read More

, , ,

Unchanging Undercurrents in the 2023 Verizon DBIR

The 2023 Verizon DBIR reveals that stolen credentials topped the list of nefarious activities by cybercriminals. Read how organizations can stay one step ahead of cybercriminals.

Read More

, , , ,

Audit Passwords in Your Environment

Scanning for security gaps in Active Directory is an essential step in mitigating the risk of a potential breach. Run a password audit.

Read More