Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.

Passwordless MFA
Passwordless MFA Understanding Passwordless Authentication for Businesses Understanding Passwordless Authentication for Businesses
General
General Modernize ADFS Authentication: How a Leading Manufacturer Secured User Login Modernize ADFS Authentication: How a Leading Manufacturer Secured User Login
Access Management and MFA
Access Management and MFA Shared Accounts: Can Passwordless Authentication Make Them Secure? Shared Accounts: Can Passwordless Authentication Make Them Secure?
Threats and Attacks
Threats and Attacks How to Avoid MFA Fatigue and Prevent Attacks How to Avoid MFA Fatigue and Prevent Attacks
Passwordless MFA
Passwordless MFA Iconic Financial Service Provider Secures Customer Data and VDI with the Octopus Iconic Financial Service Provider Secures Customer Data and VDI with the Octopus
Threats and Attacks
Threats and Attacks IBM Data Breach Report Shows Credential-based Attack Costs on the Rise IBM Data Breach Report Shows Credential-based Attack Costs on the Rise
General
General KDDI Digital Security Inc. Offers Complete Passwordless MFA Service to Enterprises KDDI Digital Security Inc. Offers Complete Passwordless MFA Service to Enterprises
Threats and Attacks
Threats and Attacks How to Stop Hackers from Bypassing 2FA How to Stop Hackers from Bypassing 2FA
Standards and Regulations
Standards and Regulations FIDO Authentication Guide: FIDO, Passkey, WebAuthn & Implementation Best Practices FIDO Authentication Guide: FIDO, Passkey, WebAuthn & Implementation Best Practices
12322