• employee authentication security

Why employees are a businesses weakest link – and how to remedy that

Published in Information-Age, on 18 January 2018, by Raz Rafaeli “People are our greatest asset,” proclaim companies all across the land – but that motto would perhaps be most appropriate to Hacker Incorporated, the loosely-affiliated organisation of cyber-baddies that has made a very successful business of invading computers and networks, for fun and great profit. The requirements for effective cyber-protection in a [...]

  • Active Directory Authentication

Password-Free, High Assurance Authentication for Active Directory Domains

With the release of this new solution, Secret Double Octopus has delivered the first authentication tool for AD that completely unburdens users from passwords while offering a more secure model.   Get a demo here  Seamless Authentication for Users, No Compromise on Security Administrators of an organization’s AD access their control of resources through passwords. This means that a just one [...]

  • quantum computing

The Quantum Computing Apocalypse is Imminent

Published by TechCrunch on January 05, 2018, by Shlomi Dolev In the ancient world, they used cubits as an important data unit, but the new data unit of the future is the qubit — the quantum bits that will change the face of computing. According to experts, quantum computers will be able to create breakthroughs in many of the most complicated [...]

By |January 14th, 2018|Categories: In the News|Tags: |
  • The Future of Multi Factor Authentication

The Future of Multi Factor Authentication

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

  • A Year in Review

A Year in Review: Our achievements of 2017

It’s been a year of innovation and growth, here at Secret Double Octopus, from developing new cutting-edge authentication products to partnering with other IT industry leaders. With the year coming to a close, we’re taking the opportunity to recall some of our important milestones from 2017. The Octopus Authenticator is Born Octopus Authenticator launch In March, the company launched [...]

By |December 27th, 2017|Categories: Articles|Tags: |
  • Secure Authentication

Will Secure Authentication Remove the Need for Credentials?

Published by Infosecurity on December 18, 2017 by Shimrit Tzur-Davi Passwords – devising them, remembering them, typing them in – can be a hassle for users, but polls on whether users would be willing to use alternative authentication methods are all over the place. Some show that users would rather use “anything” than passwords to authenticate their identities, while others claim [...]

  • Identity Security

Taking on the Growing Threat to Identity Security

The need for a robust identity security and access management (IAM) strategy is one of the central concerns of securing enterprise IT. Strong identity solutions can help firms boost their productivity by streamlining user access in additional to strengthening the overall security of the organization. But with identity theft steadily on the rise in recent years, resulting in billions in losses [...]

  • Multi factor authentication for vpn

Why your corporate VPN needs two-factor authentication (2FA)

Virtual Private Networks (VPN) are hugely popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote nodes and your servers, VPNs solve some very important problems, such as preventing hackers from finding and breaking into your servers while enabling your employees to securely access their corporate files and [...]

  • Multi factor authentication with office 365

Multi factor authentication with office 365

Office 365 is one of the most popular sets of subscription suites for productivity software used at the corporate level. The compatibility to a wide spectrum of operating systems and the variety of programs available on Office, make it an obvious choices for many medium size to large businesses. Weak Links in the Chain Office comes with its vulnerabilities however. The [...]

  • Gartner’s 2017 Market Guide for User Authentication

Secret Double Octopus Included in Gartner’s 2017 Market Guide for User Authentication

Tel Aviv, Israel-- December 5, 2017-- Secret Double Octopus, the pioneer of password-free, keyless authentication technology, announced today it was included in Gartner’s 2017 Market Guide for User Authentication as one of the report’s Representative Vendors in the user authentication category. With 81% of data breaches due to stolen or weak passwords, the need for password-free user authentication is critical for [...]