Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

, , ,

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against.

Read More

, , ,

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection.

Read More

, , , ,

Achieving CyberSecure Canada Certification

CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls.

Read More

, , ,

Cybersecurity’s Trends Shaping 2025

Here are six cybersecurity trends to watch for in 2025 as technologies like artificial intelligence and machine learning continue to advance.

Read More

, , , ,

Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) play an essential role in managing access but they also come with significant security risks.

Read More

, , , , ,

Enzoic Acquires VeriClouds

VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand.

Read More

, , , ,

Protecting Public Sector Organizations from the Threat of Compromised Credentials

Enzoic has partnered with CIS CyberMarket to enhance cybersecurity offerings for public sector organizations.

Read More

, , ,

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More