Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

,

Digitizing the Voting Process: From Paper to Passwords

There are many reasons to modernize the voting process, but transitioning from analog to digital in a security-sensitive environment is not easy.

Read More

, , ,

The Benefits NIST Password Guidelines for Security

NIST password guidelines have real-world applications in every organization. Here's what you can do to stop your passwords from being compromised.

Read More

, , , ,

A Benchmark for Your Unsafe Passwords

Read just how big the problem of compromised credentials may be for a company like yours and to provide a benchmark based on Enzoic’s audit.

Read More

,

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

The biometrics industry is expanding rapidly. Consider the following when exploring the possibilities of biometric security use.

Read More

, ,

Enzoic and OneLogin Partner to Prevent Cyber Attacks Caused By Compromised Passwords

The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product.

Read More

, ,

Understanding Bot Mitigation Limitations

Take a look at the limitations of bot mitigation and read where compromised credential screening can be highly complementary.

Read More

,

The Health of Security

Healthcare organizations are a prime target. Here are six tips that healthcare institutions can take to increase the effectiveness of their security.

Read More

, , ,

Password Blacklists: Applying the Goldilocks Principle

A password blacklist is critical to network security, but companies still struggle with questions about how long & what should be included.

Read More

, , ,

Enzoic Wins “Fraud Prevention Innovation of the Year” Award in 2020 CyberSecurity Breakthrough Awards Program

Enzoic is proud to receive the Fraud Prevention Innovation Award. Recognizing our team & the innovative nature of our solution.

Read More

,

Seven Active Directory Security Tips from The Experts

Microsoft Active Directory allows IT admins to manage users, data, and applications. Consider these seven tips when engaging with AD security.

Read More

, , ,

How CJIS Evolved Password Policy Requirements

The CJIS Security Policy is regularly updated to evolving industry best practices. The June 2019 update introduced a new policy option for passwords.

Read More

, , ,

A Tale of Two Password Protection Approaches

Read about the two methods: Enzoic’s dynamic compromised credential screening solution and a more traditional Entra ID static approach.

Read More