Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

, ,

The OpenID Shared Signals Framework

This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together.

Read More

, , ,

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against.

Read More

, , ,

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection.

Read More

, , , ,

Achieving CyberSecure Canada Certification

CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls.

Read More

, , ,

Cybersecurity’s Trends Shaping 2025

Here are six cybersecurity trends to watch for in 2025 as technologies like artificial intelligence and machine learning continue to advance.

Read More

, , , ,

Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) play an essential role in managing access but they also come with significant security risks.

Read More

, , , , ,

Enzoic Acquires VeriClouds

VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand.

Read More

, , , ,

Protecting Public Sector Organizations from the Threat of Compromised Credentials

Enzoic has partnered with CIS CyberMarket to enhance cybersecurity offerings for public sector organizations.

Read More

, , ,

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.

Read More