Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Security

, ,

Password Hashing: What Cyber Pros Need to Know

Password hashing is the process of converting a plain-text password into a fixed-length string of characters (called a hash) using a one-way cryptographic algorithm​. 

Read More

, , ,

Guidepoint Security & Enzoic: Taking on the Password Problem

Enzoic and GuidePoint Security partner to help organizations fight credential-based attacks with real-time password intelligence.

Read More

, , ,

How Credential Leaks Fuel Cyberattacks

Credential leaks are fueling cyberattacks. Learn how credential stuffing works—and how to stop account takeovers before they start.

Read More

,

Stopping MFA Fatigue Attacks Before They Start: Securing Your Entry Points

By protecting the password layer, organizations can prevent the MFA fatigue flood of notifications altogether.

Read More

, , ,

Two-Factor Authentication (2FA) vs. Multi-Factor Authentication (MFA)

How authentication works, the difference between 2FA and MFA, and the various types of secondary authentication factors.

Read More

, ,

AD Lite Password Auditor Report: Key Insights and Data

Enzoic’s password auditor report highlights the ongoing risks associated with compromised credentials in Active Directory (AD) environments

Read More

, ,

How Partners Can Help Secure Credentials

Tailored for IT security partners, a comprehensive suite of credential security solutions to enhance cybersecurity offerings.

Read More

, , ,

Rethinking Credential Security

Whether you're a CISO or a security professional this Q&A is packed with credential security insights you can implement today.

Read More

, ,

CMMC Password Compliance 101

We’ll cover the basics of CMMC, who needs to comply, what happens if you don’t, how compliance is enforced, and how Enzoic helps address a critical CMMC requirement related to protecting against compromised passwords.

Read More