Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

, , ,

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?

Read More

, , ,

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.

Read More

, ,

Public Sector Compliance: Passwords and Credentials Matter

Helping government agencies and organizations operating in the public sector navigate password and credential security.

Read More

,

Betting, Gambling, and Sports Betting Sites: The Costs of ATO

The most prevalent and damaging attack plaguing the online betting and gambling industry is fraud stemming from account takeover.

Read More

,

Harmonizing Security and Usability to Tackle Account Takeover

ATO has become a significant threat. Read how to balance strong security measures with a seamless user experience.

Read More

, ,

Navigating Compliance: Password and Credential Security

See how tools like Dark Web monitoring and credential screening can help organizations stay compliant and minimize the risk of data breaches.

Read More

, , , ,

Insights from IBM’s 2024 Cost of a Data Breach Report

The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year.

Read More

, , ,

Enzoic for Active Directory 3.5: Elevating Visibility Into Your Environment

Version 3.5 of Enzoic for Active Directory aims to provide greater visibility and control over your environment.

Read More