Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Regulation and Compliance

, , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More

, , ,

Strong Passwords: A Keystone of Cybersecurity for Water and Wastewater Infrastructure

The White House put out an official letter warning of severe cyberattacks directed at water and wastewater infrastructure across the country.

Read More

, ,

Australia’s Cybersecurity Commitment: A Detailed Overview

Australia has taken significant strides in enhancing its cybersecurity infrastructure, driven by a comprehensive government strategy.

Read More

, ,

NIST IA-5 Compliance

Understanding the Role of NIST IA-5 in SP 800-53. One essential aspect is the Control Enhancement IA-5 for password-based authentication.

Read More

, , , ,

A Guide to GDPR Compliance

Ensure GDPR Compliance and Protect Your Organization from Costly Penalties. Learn the key steps to take when handling EU citizens' data in the event of a data breach.

Read More

, , ,

*Updated!* Best Practices for Identity Management in 2023  

Identity Management Day is a great chance to seek out new ways we can reduce the impact of threat actors, and secure our digital identities.

Read More

, , , ,

Businesses Need to Revisit Password Policies

Passwords are not going anywhere due to their simplicity and cost. Industries rely on passwords to provide clients and customers access.

Read More

, ,

Safer Internet Day 2023: Four Priorities

For Safer Internet Day, reflect on the biggest changes and refocus your efforts on how businesses can make the internet a safer place. Here are four categories to tune into this year.

Read More

, , , ,

Back to Basics: IDSA Trends in 2022 are all about Preventable Cyber Incidents

DSA report reveals that 96% of respondents think they could have prevented a breach by focusing on identity security.

Read More