Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Regulation and Compliance

, , , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More

, , ,

A Keystone of Cybersecurity for Water and Wastewater Infrastructure: Strong Passwords

The White House put out an official letter warning of severe cyberattacks directed at water and wastewater infrastructure across the country.

Read More

, ,

Australia’s Cybersecurity Commitment: A Detailed Overview

Australia has taken significant strides in enhancing its cybersecurity infrastructure, driven by a comprehensive government strategy.

Read More

, ,

NIST IA-5 Compliance

Understanding the Role of NIST IA-5 in SP 800-53. One essential aspect is the Control Enhancement IA-5 for password-based authentication.

Read More

, , , ,

A Guide to GDPR Compliance

Ensure GDPR Compliance and Protect Your Organization from Costly Penalties. Learn the key steps to take when handling EU citizens' data in the event of a data breach.

Read More

, , ,

*Updated!* Best Practices for Identity Management in 2023  

Identity Management Day is a great chance to seek out new ways we can reduce the impact of threat actors, and secure our digital identities.

Read More

, , , ,

Businesses Need to Revisit Password Policies

Passwords are not going anywhere due to their simplicity and cost. Industries rely on passwords to provide clients and customers access.

Read More

, ,

Safer Internet Day 2023: Four Priorities

For Safer Internet Day, reflect on the biggest changes and refocus your efforts on how businesses can make the internet a safer place. Here are four categories to tune into this year.

Read More

, , , ,

Back to Basics: IDSA Trends in 2022 are all about Preventable Cyber Incidents

DSA report reveals that 96% of respondents think they could have prevented a breach by focusing on identity security.

Read More