Learn all about password-alternatives on the Octopusblog. Read about how Octopus Authenticator tools are replacing traditional password based methods.

Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

Published at Entrepreneur on Marth 15.2018 by Raz Rafaeli The password, the most common way to authenticate users around the globe, has been in slow decline for over a decade. Bill Gates famously asserted at an RSA conference in 2004, "There is no doubt that over time, people are going to rely less and less on passwords ... they just don't meet the challenge for [...]

Federated Identity Vs SSO

For today’s enterprise, maintaining an arsenal of effective network tools is all about access. Organizations need to provide access to a slew of online programs and applications to the right people in order to streamline operations. To accomplish this, organizations utilize methods to maximize the use of digital identities for multiple users. Single Sign On (SSO) and its varient called Federated [...]

What Will Authentication Look Like in 2018

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

What you need to know about password vulnerabilities (Pt. 2)

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

Poor Visibility, Weak Passwords Compromise Active Directory

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

What you need to know about password vulnerabilities (Pt. 1)

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]

Why employees are a businesses weakest link – and how to remedy that

Published in Information-Age, on 18 January 2018, by Raz Rafaeli “People are our greatest asset,” proclaim companies all across the land – but that motto would perhaps be most appropriate to Hacker Incorporated, the loosely-affiliated organisation of cyber-baddies that has made a very successful business of invading computers and networks, for fun and great profit. The requirements for effective cyber-protection in a [...]

The Future of Multi Factor Authentication

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

Survey Maps User Preferences of Leading Authentication Tools

For the full report go to: http://doubleoctopus.com/facing-a-future-without-passwords/ In with the new, out with the old This pretty much sums up the dominating trends in authentication methods over the past several years. With many traditional methods depreciated, more and more replacement technologies have been making an entrance into the market. The question for businesses is which particular method will be the most adequate [...]

Secret Double Octopus Survey Examines User Preferences for Password Alternatives

Tel Aviv, Israel- October 30, 2017- The results of a survey conducted by Secret Double Octopus, the pioneer of password-free, keyless authentication technology, found that among employees of medium (1000-5000) and large (5000+) enterprises, 81% of respondents perceive Face ID as trustworthy and 91% think it will be easy to use. Currently, Touch ID is the leading alternative to passwords with [...]