Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, , ,

Enzoic’s Threat Research: From Extensive Knowledge to Decisive Action

Effective threat intelligence for compromised credential screening involves discerning reconnaissance and real-time analysis and deployment.

Read More

, , , ,

The City of Prescott Utilizes Automated Password Security to Protect Employees from ATO

The City of Prescott wanted an automated and reliable method to assess and enforce password security in their organization.

Read More

, , , ,

CISA Adds Single-Factor Authentication to List of Bad Practices

The Cybersecurity and Infrastructure Security Agency (CISA) announced adding single-factor authentication to their list of Bad Practices.

Read More

, , , ,

The City of Paso Robles Taps Enzoic for Password Peace of Mind

Protecting city resources from a cyberattack is of critical importance. Enzoic helped modernize its approach to password management.

Read More

, , ,

Busting the Myths Surrounding Password-Based Security

Myths surrounding password usage and set the record straight on the best practices businesses should adopt for proper password protocols.

Read More

, , ,

The Reality of Compromised Credentials

OWASP calls out “Credential Cracking” and "Credential Stuffing" as top-level terms related to credentials. Read to learn about the terms.

Read More

, ,

How The Current Threat Landscape Impacts Authentication Security

One of the biggest challenges: Installing security & privacy measures to mitigate the threats to new technologies & remote capabilities.

Read More

,

Cultivating a Cybersecure Culture at Work

A constantly shifting threat landscape means cybersecurity best practices should be on everyone’s mind, not just your CTO or CISO.

Read More

, ,

Think You’re Smarter than a Hacker?

Hackers aren’t sitting around guessing. They are using computing power, combined with lists of passwords and sets of compromised credentials.

Read More