5 of the Spookiest Threats Entering Your Security Operations Center

Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All... The post 5 of the Spookiest Threats Entering Your Security Operations Center ...
fake news

Media Under Cyberattack: The Real Fake News Threat

The term “fake news” is one that we hear often lately, a phrase uttered when someone doesn’t like or agree with media coverage. But fake news has a more sinister side, one ...
Security Boulevard

8 Ways to Mitigate Credential Stuffing

We all know that data breaches have leaked billions of user credentials (usernames and passwords) on the public internet and dark web. The 2018 Global Password Security Report shows an alarming 50% ...
Forced Password Reset? Check Your Assumptions

Forced Password Reset? Check Your Assumptions

Almost weekly now I hear from an indignant reader who suspects a data breach at a Web site they frequent that has just asked the reader to reset their password. Further investigation ...
State Farm Says Security Incident Might Have Exposed Customers’ Data

State Farm Says Security Incident Might Have Exposed Customers’ Data

Insurance company State Farm revealed that a digital security incident might have exposed their customers’ personal information. In August 2019, ZDNet obtained a copy of a letter in which State Farm disclosed ...

How to Prevent Insider Data Breaches at your Business

Guest article by Dan Baker of SecureTeamMajority of security systems are installed to try and forestall any external threats to a business’ network, but what about the security threats that are inside ...
online gaming

Tackling the Issue of Online Gaming Credential Stuffing

When it comes to cyberattacks, what causes them and the risks they pose, our attention focuses primarily on the most vital industry verticals: financial, health care, commerce and government. So when I ...
Security Boulevard

Enzoic Part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019

Enzoic is proud to be part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019. Enzoic was selected to be part of this exclusive list because of ...

Credential Stuffing Attacks vs. Brute Force Attacks

The Open Web Application Security Project (OWASP), a non-profit that is dedicated to web application security, classifies credential stuffing as a subset of brute force attacks. However, in practice, the two types ...
Cyber Security Roundup for April 2019

Cyber Security Roundup for April 2019

The UK government controversially gave a green light to Huawei get involved with the building of the UK's 5G networks, although the Chinese tech giant role will be limited to non-sensitive areas ...
Loading...