Automate Password Policy & NIST Password Guidelines

Automate Password Policy & NIST Password Guidelines

Enable automated password policy enforcement with daily password auditing and customizable remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily ...

Why Biometric Authentication is Just Part of the Security Puzzle

Americans are growing increasingly comfortable with biometrics as a means of confirming their identity, with a recent survey finding 81% of respondents would be receptive to using biometrics in airports. Many consumers ...

3 Key Elements of the NIST Password Requirements for 2020

| | all posts, NIST 800-63b
Reasons Why NIST Password Requirements Should Drive Your Password Strategy in 2020 Despite the doubters claiming that passwords will go the way of overhead projectors, they are still prevalent. They are still ...
NIST Privacy Framework

What the NIST Privacy Framework Means for Password Policy

| | all posts, NIST Privacy Framework
Now Is Time To Contribute Your Feedback on the NIST Privacy Framework The National Institute of Standards and Technology (NIST) has recently released the preliminary draft of the NIST Privacy Framework: A ...

Enzoic a “Top 10 Most Valuable Cybersecurity Solution Provider” in the CEO Views

Enzoic was selected to be a “Top 10 Most Valuable Cybersecurity Solution Provider in 2019” because of the innovative cybersecurity and fraud prevention products. Enzoic, formerly PasswordPing, provides low user-friction solutions for ...

7 Password Problems Solved by Enzoic Password Policy Enforcement

There are many excellent password policy enforcement tools built into Active Directory. But the out-of-the-box AD functionality does not meet all the password standards and new password policy recommendations from NIST and ...

Are PSD2 SCA Options Too Narrow in Scope?

On September 14th, new PSD2 requirements known as Strong Customer Authentication (SCA) were introduced across Europe. These requirements are part of the EU Revised Directive on Payment Services (PSD2) and are intended ...

8 Ways to Mitigate Credential Stuffing

We all know that data breaches have leaked billions of user credentials (usernames and passwords) on the public internet and dark web. The 2018 Global Password Security Report shows an alarming 50% ...
Enzoic Continues to Grow with Appointment of New Marketing Director

Enzoic Continues to Grow with Appointment of New Marketing Director

| | all posts, Company News, Enzoic, Press Release
Tech Marketing Expert, Kim Jacobson, joins Enzoic as a Director of Marketing. Boulder, CO – Sept 10, 2019 – Enzoic, a leading provider of compromised credential screening solutions, recently announced that Kim ...
Hacking a Smartphone by simply sending an SMS?

11 Ways Employees Can Be Your Weak Link for Cybersecurity

With some creative tips to help engage and educate your employees on cybersecurity Each year, incidences of cyberattacks on companies are increasing with the intent to steal sensitive information. There are cybersecurity ...
Loading...