Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

, , ,

Two-Factor Authentication (2FA) vs. Multi-Factor Authentication (MFA)

How authentication works, the difference between 2FA and MFA, and the various types of secondary authentication factors.

Read More

, ,

AD Lite Password Auditor Report: Key Insights and Data

Enzoic’s password auditor report highlights the ongoing risks associated with compromised credentials in Active Directory (AD) environments

Read More

, ,

Research on Compromised Credentials

Stolen credentials are an easy doorway into an organization's systems, and standard password policies aren’t keeping attackers out.

Read More

, ,

How Partners Can Help Secure Credentials

Tailored for IT security partners, a comprehensive suite of credential security solutions to enhance cybersecurity offerings.

Read More

,

Five Must-Know Insights for Credential Monitoring

Password and credential monitoring are essential. Spot compromised accounts early and stop breaches before they happen.

Read More

, ,

The OpenID Shared Signals Framework

This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together.

Read More

, , ,

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against.

Read More

, , ,

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection.

Read More

, , , ,

Achieving CyberSecure Canada Certification

CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls.

Read More