Read all about Octopus Authenticator tools and the Secret Sharing algorithm they’re are based on. Learn how Octopus Authenticator tools are replacing traditional password-based methods.

How GDPR Will Change the Face of Digital Authentication

The highly anticipated General Data Protection Regulations of the European Union (GDPR) will come into effect in a few short months. The laws of GDPR represent a total paradigm shift in IT regulation. While other national and international legislation has focused on laying down specific rules for interacting with digital data, GDPR goes one step further by changing the relationship between [...]

Finding the Best Mobile Authentication Solution for your Enterprise

In the rapidly growing industry of advanced authentication, mobile solutions play a central role. Mobile apps for authentication have growing in popularity for quite some time. Researchers at Gartner predicted in 2017 that the majority of users would implement some form of mobile authentication in the coming years. Two important factors are driving this trend. First is from the security angle. [...]

What is the Total Cost of Deploying Multi Factor Authentication for your Business?

Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]

What you need to know about password vulnerabilities (Pt. 2)

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

Poor Visibility, Weak Passwords Compromise Active Directory

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

How push notifications can revolutionize your authentication security

The many horror stories that regularly surface on the web make it certain beyond the shadow of a doubt that plain passwords are a cumbersome and bad security practice. A recent survey by Secret Double Octopus found that the outstanding majority of corporate employees are eyeing password-free technologies as their preferred method of authentication, both from a security and an ease-of-use [...]

Password-Free, High Assurance Authentication for Active Directory Domains

With the release of this new solution, Secret Double Octopus has delivered the first authentication tool for AD that completely unburdens users from passwords while offering a more secure model.   Get a demo here  Seamless Authentication for Users, No Compromise on Security Administrators of an organization’s AD access their control of resources through passwords. This means that a just one [...]

The Future of Multi Factor Authentication

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

Will Secure Authentication Remove the Need for Credentials?

Published by Infosecurity on December 18, 2017 by Shimrit Tzur-Davi Passwords – devising them, remembering them, typing them in – can be a hassle for users, but polls on whether users would be willing to use alternative authentication methods are all over the place. Some show that users would rather use “anything” than passwords to authenticate their identities, while others claim [...]

Taking on the Growing Threat to Identity Security

The need for a robust identity security and access management (IAM) strategy is one of the central concerns of securing enterprise IT. Strong identity solutions can help firms boost their productivity by streamlining user access in additional to strengthening the overall security of the organization. But with identity theft steadily on the rise in recent years, resulting in billions in losses [...]