Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, ,

Early Trends in 2025

With every new year bringing new technologies, expanding attack surfaces, and legions of salivating threat actors.

Read More

, ,

How Partners Can Help Secure Credentials

Tailored for IT security partners, a comprehensive suite of credential security solutions to enhance cybersecurity offerings.

Read More

, ,

Fortune 500 Employees’ Credentials Under Siege

1 in 10 Fortune 500 employees had their credentials exposed. Each compromised account was found an average of 5.7 times.

Read More

,

Five Must-Know Insights for Credential Monitoring

Password and credential monitoring are essential. Spot compromised accounts early and stop breaches before they happen.

Read More

, ,

The OpenID Shared Signals Framework

This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together.

Read More

, , ,

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection.

Read More

, , , ,

A Secure Future in Australia with the Scam-Safe Accord

The Scam-Safe Accord launched by the Australian Banking Association in response to the increasing prevalence of scams and fraud.

Read More

, , ,

Cybersecurity’s Trends Shaping 2025

Here are six cybersecurity trends to watch for in 2025 as technologies like artificial intelligence and machine learning continue to advance.

Read More

, , , ,

Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) play an essential role in managing access but they also come with significant security risks.

Read More