About Amit Rahav

Seasoned with 25 years of experience in larger corporations and startups alike, in sales, marketing, customer care and product management, Amit is tasked with the business development, customer success, and marketing operations at Secret Double Octopus. Amongst Amit’s favorite activities is underwater scuba diving, with a particular fascination for octopuses.

What Will Authentication Look Like in 2018

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

What is the Total Cost of Deploying Multi Factor Authentication for your Business?

Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]

What you need to know about password vulnerabilities (Pt. 1)

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]

The Future of Multi Factor Authentication

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

Why your corporate VPN needs two-factor authentication (2FA)

Virtual Private Networks (VPN) are hugely popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote nodes and your servers, VPNs solve some very important problems, such as preventing hackers from finding and breaking into your servers while enabling your employees to securely access their corporate files and [...]

No-password login: The frictionless and secure alternatives to passwords

Providing secure and easy-to-use authentication and login mechanisms should be one of the main goals every online service pursues. Unfortunately, passwords, the traditional method to protect online accounts and keep intruders out, are becoming less reliable and more cumbersome to maintain, both for users as well as service providers. The industry has become in desperate need for a no-password option. Where [...]

By |August 22nd, 2017|Categories: Articles|Tags: , |