Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, ,

Understanding the Fragility of Digital Identities

Digital identities are the keys to our online worlds. Recent analyses uncover why organizations must take a strong approach to security.

Read More

, , , , ,

Insights from 2023’s Cost of a Data Breach Report

The average cost of a data breach in 2023 jumped to $4.45 million, marking a 15% increase over the past three years according to IBM's report.

Read More

, ,

NIST IA-5 Compliance

Understanding the Role of NIST IA-5 in SP 800-53. One essential aspect is the Control Enhancement IA-5 for password-based authentication.

Read More

, ,

Worried About Identity Theft? There’s a Reason for That. 

What is identity theft, and what’s happening to increase the impact so dramatically? Read what enterprises can do to make positive change.

Read More

, ,

Avoiding Insider Threats When Layoffs Occur

As layoffs continue, organizations need to be aware of insider threats. Here are some tips you can use to protect your business.

Read More

, ,

Infostealers: The Growing Threat

What should we know about infostealers? Hear our threat research experts explain what they are, what they steal, and much more.

Read More

, , ,

Unchanging Undercurrents in the 2023 Verizon DBIR

The 2023 Verizon DBIR reveals that stolen credentials topped the list of nefarious activities by cybercriminals. Read how organizations can stay one step ahead of cybercriminals.

Read More

, ,

Twin to Win: Security Pros and Cons of Digital Twins

Digital twins have become an increasingly popular technology. However, potential security concerns need to be addressed sooner rather than later.

Read More

, , ,

Protecting Personally Identifiable Information in an Increasingly Connected World

Sensitive personal information is highly sought after by cybercriminals. As identity theft incidents continue to rise, organizations need effective solutions to protect PII.

Read More