Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

Protect Active Directory Better

Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how.

Read More

, ,

Understanding the Fragility of Digital Identities

Digital identities are the keys to our online worlds. Recent analyses uncover why organizations must take a strong approach to security.

Read More

, , , , ,

Insights from 2023’s Cost of a Data Breach Report

The average cost of a data breach in 2023 jumped to $4.45 million, marking a 15% increase over the past three years according to IBM's report.

Read More

, ,

NIST IA-5 Compliance

Understanding the Role of NIST IA-5 in SP 800-53. One essential aspect is the Control Enhancement IA-5 for password-based authentication.

Read More

, , , ,

A Guide to GDPR Compliance

Ensure GDPR Compliance and Protect Your Organization from Costly Penalties. Learn the key steps to take when handling EU citizens' data in the event of a data breach.

Read More

, ,

Worried About Identity Theft? There’s a Reason for That. 

What is identity theft, and what’s happening to increase the impact so dramatically? Read what enterprises can do to make positive change.

Read More

, ,

Avoiding Insider Threats When Layoffs Occur

As layoffs continue, organizations need to be aware of insider threats. Here are some tips you can use to protect your business.

Read More

, ,

Infostealers: The Growing Threat

What should we know about infostealers? Hear our threat research experts explain what they are, what they steal, and much more.

Read More

, , ,

Unchanging Undercurrents in the 2023 Verizon DBIR

The 2023 Verizon DBIR reveals that stolen credentials topped the list of nefarious activities by cybercriminals. Read how organizations can stay one step ahead of cybercriminals.

Read More