Safeguarding identity security  We need to talk about MFA

Research on Compromised Credentials

| | credential screening, Cybersecurity, MFA
Osterman Research Exposes the Growing Risk   The new Osterman Research report, Safeguarding Identity Security: We Need to Talk About MFA, surveyed 126 identity, IAM, and cybersecurity leaders from U.S. companies averaging 3,400 employees. The data shows a gap in security that attackers are actively exploiting: 85.7% say cybercriminals are more ... Read More
Early Trends in 2025

Early Trends in 2025

With every new year bringing new technologies, expanding attack surfaces, and legions of salivating threat actors ... Read More

How Partners Can Help Secure Credentials

Tailored for IT security partners, a comprehensive suite of credential security solutions to enhance cybersecurity offerings ... Read More

Fortune 500 Employees’ Credentials Under Siege

1 in 10 Fortune 500 employees had their credentials exposed. Each compromised account was found an average of 5.7 times ... Read More

Five Must-Know Insights for Credential Monitoring

Password and credential monitoring are essential. Spot compromised accounts early and stop breaches before they happen ... Read More
Revolutionize Your ATO Defense with Modern Credential Security

ATO Attacks from a Threat Intel Perspective

| | , Threat Intel
The battle against ATO attacks is one of speed, scale, and sophistication and defenders are dealing with an overwhelming influx of data ... Read More

Rethinking Credential Security

Whether you're a CISO or a security professional this Q&A is packed with credential security insights you can implement today ... Read More
CMMC Password Compliance 101

CMMC Password Compliance 101

We’ll cover the basics of CMMC, who needs to comply, what happens if you don’t, how compliance is enforced, and how Enzoic helps address a critical CMMC requirement related to protecting against compromised passwords ... Read More
Shared Signals Framework

The OpenID Shared Signals Framework

This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together ... Read More

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against ... Read More