Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing NIST 800-63

, , ,

Automate Password Policy & NIST Password Guidelines

Enable a quick-to-deploy, automated password policy and daily exposed password screening. Follow NIST password guidelines in Active Directory. Here is how!

Read More

, , ,

3 Key Elements of the NIST Password Requirements

Why NIST Password Requirements Should Drive Your Password Strategy in 2020. Reduce user friction and improve password policy.

Read More

, , ,

What the NIST Privacy Framework Means for Password Policy

The new draft of the NIST Privacy Framework is ready for public privacy and security expert commentary. Send your feedback by the October 24 deadline.

Read More

, , , ,

A Guide to Law Firm Cybersecurity Risks & Ethical Compliance

Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.

Read More

, ,

NIST Special Publication 800-63 is Final

The big changes to NIST password recommendations we’ve been talking about are now official: NIST 800-63 is final. It’s important to know that this overhaul is about more than just passwords. It’s a full reworking of digital identity guidelines with a suite of new documents and a flexible approach to using them.

Read More

, ,

Looking Closer at NIST Password Guidelines for Checking Compromised Passwords

NIST suggests passwords should be screened against commonly-used, expected, or compromised passwords. This is intended to ensure passwords are not found in common cracking dictionaries that would make them easy to guess. These checks can occur at account creation and password reset. But then what? How do you know if they are still safe after time?

Read More

, ,

Surprising Password Guidelines from NIST

The US National Institute of Standards and Technology (NIST) just finalized new draft guidelines, completely reversing previous password security recommendations and upending many of the standards and best practices security professionals use when forming policies for their companies.

Read More