Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

Why Biometric Authentication is Just Part of the Security Puzzle

Why Biometric Authentication is Just a Piece of the Security Puzzle. Biometrics are easy to use but should be used with another factor.

Read More

, , ,

3 Key Elements of the NIST Password Requirements

Why NIST Password Requirements Should Drive Your Password Strategy in 2020. Reduce user friction and improve password policy.

Read More

, , ,

What the NIST Privacy Framework Means for Password Policy

The new draft of the NIST Privacy Framework is ready for public privacy and security expert commentary. Send your feedback by the October 24 deadline.

Read More

CEO Views: Valuable Cybersecurity Solution Provider

Enzoic was selected because of it's innovative cybersecurity and fraud prevention products.

Read More

7 Password Problems Solved by Password Policy Enforcement

Organizations need password policy enforcement that screens for compromised passwords daily and follows NIST password guidelines. Here are some tips!

Read More

,

Protecting Loyalty Accounts and Rewards Programs

Many companies are lax in protecting loyalty accounts from account takeover attacks and fraud. And it hurts them financially. Here are some tips!

Read More

, ,

Are PSD2 SCA Options Too Narrow in Scope?

On 09/14, PSD2 SCA requirements were introduced in the EU. It will help protect customers but why did they not consider lower-customer-friction options?

Read More

,

New Jersey Data Breach Notification Law

As of Sept 1st, 2019, businesses based in New Jersey are now required to notify impacted users of online account information exposed in a data breach.

Read More

,

8 Ways to Mitigate Credential Stuffing Attacks

There is no one way to mitigate all credential stuffing attacks but a layered approach can reduce risk without negatively impacting the user experience.

Read More