RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Account Takeover, Cybersecurity
Over 80% of hacking-related breaches involved the use of lost or stolen credentials. We analyzed the findings and uncovered some additional data points.
Account Takeover, Active Directory
Compromised passwords are considered one of the weakest elements in cybersecurity. Why they are such a threat? What can organizations can do about them?
This is a brief summary of the new DIBBS (DLA Internet Bid Board System) password format changes and the rationale behind some of these changes.
Account Takeover, Active Directory, Cybersecurity, Threat Intel
To provide the most effective defense, our compromised credential database is continuously updated to defend against credential stuffing attacks
Account Takeover, Healthcare Cybersecurity
Account takeover during the COVID-19 pandemic: As the threat to our health grows, so do the cyberattacks. Why is this and how can organizations prevent it?
Account Takeover, Active Directory, Healthcare Cybersecurity, NIST 800-63, Regulation and Compliance
Hospitals and healthcare providers comply with HIPAA to keep stakeholders secure. But how should employee password policy be handled in light of HIPAA?
Account Takeover, Active Directory, Healthcare Cybersecurity, Regulation and Compliance
Employee Password Security for Healthcare Providers: This is a significant issue. How can hospitals & healthcare providers tackle password security?
Account Takeover, Active Directory, NIST 800-63, Regulation and Compliance
NIST 800-171 guidelines say to enforce minimum password complexity and change of characters when new passwords are created. Here is how you can do it!
Account Takeover, Active Directory
Microsoft found 44 million accounts were vulnerable due to the use of stolen passwords. How can organizations combat password reuse & compromised passwords?
No Spam. Only sweet content and updates on our products and solutions.