How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOs

How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOs

As federal agencies develop more online services and systems to meet the mission of the U.S. government, their appetite and need to develop and deploy secure software applications rapidly continues to grow ...

Tales from the Front Lines: Large Retailer Achieves Near Immediate Time-to-Value

One of our newest customers is a large, community-based retailer that had a mobile application and API account takeover problem. Roughly 12 months ago, they selected a JavaScript and SDK-based bot mitigation ...

Integrating the Risk Management Framework (RMF) with DevOps

Information security should be at the heart of every system launched. In accordance with the Federal Information Security Management Act (FISMA), an information technology system is granted an Authority to Operate (ATO) ...
Kasa Security

Kasa Camera Vulnerability Discovery: Responsible Disclosures Feel Like Groundhog Day, Again

When APIs Say Too Much As a Midwesterner and hobby farmer I spend a lot of time solving problems. A few months ago I encountered a problem where a live 2-month-old cucumber ...
How Account Takeover Botnets Outsmart Traditional Security Controls

How Account Takeover Botnets Outsmart Traditional Security Controls

Account Takeover (ATO) describes when an online account is accessed and/ or used by someone other than its legitimate owner, usually for malicious purposes. Account Takeover attacks happen when an attacker is ...

5 Industries at Risk for Credential Stuffing and ATO

All industries are targets for cyber-attacks, but some are more targeted due to the value of the accounts. Five industries in particular are more at-risk for credential stuffing and account takeover (ATO) ...

The Costs and Risks of Account Takeover

Account takeover (ATO) attacks result in billions of dollars of fraud and damage to brand reputation each year. These are the costs and risks associated with ATO. Defining ATO Let’s start by ...

Enzoic Part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019

Enzoic is proud to be part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019. Enzoic was selected to be part of this exclusive list because of ...
Barracuda Networks ATO Attacks

Barracuda Networks Sees More ATO Attacks Ahead

A new report published by Barracuda Networks warns the number of account takeover (ATO) incidents involving compromised email credentials is starting to rise. A study of 50 randomly selected organizations occurring over ...
Security Boulevard
Researchers find bad bots designed for account takeover on 100% of websites with login pages

Researchers find bad bots designed for account takeover on 100% of websites with login pages

Locking out a “user” after too many failed login attempts should be a best practice by anyone who owns a website with a login field or subscription form, if a new research ...