Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.

Passwordless MFA
Passwordless MFA High-Assurance MFA for Enterprise: Proximity + Push = Government-Class Login for Privileged Business Users Read more
Access Management and MFA
Access Management and MFA Using MFA to Protect Remote Workers Across the VPN Read more
Access Management and MFA
Access Management and MFA MFA for Shared Accounts Removes Risk in Critical Industries Read more
Standards and Regulations
Standards and Regulations Can Passwordless MFA Make FIDO Work for Enterprise? Read more
General
General The SINET16 Innovator Award Recognizes MFA Innovation Read more
Access Management and MFA
Access Management and MFA The Problem With SMS Authentication Read more
Threats and Attacks
Threats and Attacks Stop Account Takeover (ATO) With Strong Authentication Read more
Threats and Attacks
Threats and Attacks Credential stuffing: What it is, why it works,
and three ways to put an end to it
Read more
Passwordless MFA
Passwordless MFA Why Passwordless MFA From the CTO's Chair Read more
Threats and Attacks
Threats and Attacks How to Protect MFA from SIM Swapping Read more
Passwordless MFA
Passwordless MFA Passwordless MFA in An Hour Read more
Passwordless MFA
Passwordless MFA Can getting rid of passwords stop ransomware in higher education? Read more
Passwordless MFA
Passwordless MFA Three reasons IT leaders aren’t doing passwordless—and why they should Read more
Access Management and MFA
Access Management and MFA AuthZ vs AuthN – What is the Difference Exactly? Read more
Threats and Attacks
Threats and Attacks Four Simple Ways to Stop All Types of Password Attacks Read more
Access Management and MFA
Access Management and MFA 2FA vs MFA: What’s the difference—in practice—and how much authentication is enough? Read more
Passwordless MFA, Threats and Attacks
Passwordless MFA, Threats and Attacks What is MFA Push Bombing Attack and How to Stop It Read more
Passwordless MFA
Passwordless MFA Passwordless MFA for Critical Infrastructure: A Guide to Finding Your Ideal Solution Read more
Passwordless MFA
Passwordless MFA Part II: A Practical Path to Passwordless Phishing Resistant MFA Read more
Passwordless MFA
Passwordless MFA Rolling out passwordless MFA? Be sure not to leave Linux behind Read more
Passwordless MFA
Passwordless MFA Part I: Passwordless Adds Phishing Resistance,But How You Get There Matters Read more
Passwordless MFA
Passwordless MFA Critical Infrastructure Can Skip Traditional MFA for Passwordless MFA Read more
General
General ForgeRock and Secret Double Octopus Announce Strategic Partnership Read more
Passwordless MFA
Passwordless MFA The ROI Business Case for Funding Passwordless MFA Initiatives Read more
Passwordless MFA
Passwordless MFA What is Full Passwordless and What is Not Read more
General
General SDO Wins Another InfoSec Award for Passwordless Authentication Read more
General
General FIDO Passkey Announcement - What's it Mean for the Enterprise? Read more
Threats and Attacks
Threats and Attacks Addressing the Log4j Vulnerability Read more
Threats and Attacks
Threats and Attacks Why Defense-in-Depth is Key to Defeating Ransomware Read more
Passwordless MFA
Passwordless MFA Securing Legacy Systems with Passwordless Authentication Read more
Threats and Attacks
Threats and Attacks Protecting Enterprises from State-Sponsored Hacks Read more
Passwordless MFA
Passwordless MFA Why Zero Trust Means Zero Passwords Read more
Passwordless MFA
Passwordless MFA The Aite 2021 Passwordless Report: Who is "Best in Class"? Read more
General
General 5 Major Trends In Cybersecurity Investments Read more
Passwords
Passwords A Sobering Reminder: Passwords are a Threat to Public Infrastructure Read more
Passwords
Passwords Why password policies are a waste of time and money Read more
General
General Cybersecurity in 2021: betting big on identity and authentication Read more
General
General Cyberwarfare took a leap in 2020 and the industry needs a new approach Read more
Standards and Regulations
Standards and Regulations Authentication and government contracts: the password requirements of NIST and DFARS Read more
Passwords
Passwords Corporate credentials for sale in the dark web Read more
General
General Avoiding the Help Desk Backlog Read more
General
General How the COVID pandemic can help digital transformation  Read more
Passwordless MFA
Passwordless MFA How Passwordless Advanced in 2020 and Where It’s Headed Read more
Passwords
Passwords When it comes to passwords, even the tech giants mess up  Read more
Access Management and MFA
Access Management and MFA 2020 in review: A year to remember Read more
General
General Best of 2020: Our most-read blogs of the year Read more
General
General 5G Networks and the Future of Authentication Read more
General
General Where should CISOs put their money in 2021? Read more
Threats and Attacks
Threats and Attacks Emotet is back, and it’s after your passwords! Read more
General
General Small business security: to MSSP or not to MSSP? Read more
Access Management and MFA
Access Management and MFA Single Sign-On - How Does it Work and What is Passwordless SSO? Read more
Passwordless MFA
Passwordless MFA Active Directory & Passwordless Authentication Read more
Access Management and MFA
Access Management and MFA Are 2FA and MFA an Answer to Password Fatigue? Read more
Standards and Regulations
Standards and Regulations What is SAML and how is it being used? Read more
Threats and Attacks
Threats and Attacks Top 6 Password Attacks and How to Prevent Them Read more
General
General Protecting Health Professionals and Medical Infrastructure Read more
Threats and Attacks
Threats and Attacks The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them Read more
Access Management and MFA
Access Management and MFA Securing Remote Access Users Read more
Threats and Attacks
Threats and Attacks Fight Insider Threats with Passwordless Authentication  Read more
Standards and Regulations
Standards and Regulations Your Complete Guide to FIDO, FIDO2 and WebAuthn Read more
General
General 3 Pillars of Digital Transformation: Cost, Usability, and Security Read more
Passwords
Passwords How to handle passwords under GDPR Read more
Passwords
Passwords Put a PIN in that: why passwords vs. PINs comparisons are irrelevant Read more
General
General Getting back to normal: secure work in a post-coronavirus world  Read more
Passwordless MFA
Passwordless MFA LDAP, Active Directory and Federated Identity: What You Need to Know Read more
Passwordless MFA
Passwordless MFA 2FA VS Passwordless Authentication - Equal Enterprise Security? Read more
Threats and Attacks
Threats and Attacks Supply Chain attacks: mitigating hidden risks with Passwordless Authentication Read more
Threats and Attacks
Threats and Attacks Universities and Cyber Security: A Lesson From Iranian Hackers Read more
Access Management and MFA
Access Management and MFA The Future of Corporate VPN Read more
General
General 10 Security Tips For The Remote Workforce Read more
General
General Enabling Remote Work While Ensuring Maximum Security Read more
Access Management and MFA
Access Management and MFA Software Tokens Vs Hardware Tokens Read more
Access Management and MFA
Access Management and MFA Active Directory In The Age Of The Cloud Read more
Threats and Attacks
Threats and Attacks SIM Swapping – The End Of 2nd Factor Authentication? Read more
Threats and Attacks
Threats and Attacks Cloud Phishing Risks and Mitigation Read more
General
General Cloud Identity Management Challenges Read more
Standards and Regulations
Standards and Regulations Authentication Federation VS Single Sign-On Read more
Passwordless MFA
Passwordless MFA Passwordless Authentication is BOOMING Read more
Threats and Attacks
Threats and Attacks State Sponsored Identity Breaches Read more
Passwords
Passwords Password Managers - Convenience is Not Security Read more
Threats and Attacks
Threats and Attacks Bypassing 2FA Read more
Passwords
Passwords True Cost of Password Based Authentication Read more
Threats and Attacks
Threats and Attacks The Ultimate Solution For Credential Stuffing Attacks Read more
General
General On-Premise Plus Cloud = The Hybrid Approach Read more
Access Management and MFA
Access Management and MFA Air Gap Network Multi Factor Authentication Read more
Passwords
Passwords In Passwords We Trust! But Why? Read more
General
General 14 British Cybersecurity Influencers That You Need to Follow Read more
Threats and Attacks
Threats and Attacks Astaroth - The Great Duke of Hell Read more
Passwordless MFA
Passwordless MFA Every Password Matters - The PCM Case Read more
Threats and Attacks
Threats and Attacks GoldBrute - The Enemy of RDP Read more
General, Threats and Attacks
General, Threats and Attacks How Poor Passwords Turned 50,000 Servers Into Cryptocurrency Miners Read more
Threats and Attacks
Threats and Attacks How Phishing Can Overcome 2FA Read more
General, Threats and Attacks
General, Threats and Attacks The Verizon Breach Report - 4 Things Learned Read more
Passwordless MFA
Passwordless MFA Authenticating Humans While Removing the Human Factor Read more
Access Management and MFA
Access Management and MFA Shared Account Authentication - Solved! Read more
Passwordless MFA
Passwordless MFA What Passwordless Authentication Prevents? Read more
Passwordless MFA
Passwordless MFA Password Mangers Vs. Passwordless Authentication Read more
Passwordless MFA
Passwordless MFA How Does Passwordless Authentication Work? Read more
Threats and Attacks
Threats and Attacks Solving Phishing from the Root Read more
Passwords
Passwords The State of Credentials Read more
Threats and Attacks
Threats and Attacks Password Spraying - The Citrix Breach Read more
Passwordless MFA
Passwordless MFA Passwordless Authentication for the Real-world Read more
General, Threats and Attacks
General, Threats and Attacks How stolen passwords are damaging the cybersecurity industry Read more
Threats and Attacks
Threats and Attacks Big Credential Breaches Read more
Standards and Regulations
Standards and Regulations Establishing strong authentication for PSD2 Read more
Access Management and MFA
Access Management and MFA Securing Remote Access - The Guide Read more
Access Management and MFA
Access Management and MFA How to Evaluate Push Authentication Solutions Read more
Threats and Attacks
Threats and Attacks Preventing Corporate Account Takeover (CATO) Read more
General
General What will Authentication Look Like in 2019 Read more
Access Management and MFA
Access Management and MFA Virtual Desktop (VDI) Authentication Read more
Threats and Attacks
Threats and Attacks Privileged Users are Privileged Targets Read more
Passwordless MFA
Passwordless MFA Password- Based Authentication: Vulnerabilities And Alternative Solutions Read more
Threats and Attacks
Threats and Attacks Credential Stuffing - HSBC Case Study Read more
Access Management and MFA
Access Management and MFA VPN MFA - The Gateway to the Kingdom Read more
Standards and Regulations
Standards and Regulations Understanding Today's Data Regulations (Part 2) Read more
Threats and Attacks
Threats and Attacks Man in the Browser (MITB) Read more
Standards and Regulations
Standards and Regulations Understanding Today's Data Regulations Pt.1 Read more
General, Threats and Attacks
General, Threats and Attacks California Weak Password Ban Read more
General, Access Management and MFA
General, Access Management and MFA The UN Unexpected Example of Poor Password Management Read more
General
General Certificates and Inherit Trust Read more
General
General Practice What you Preach - IT's Achilles Heel Read more
Passwords
Passwords What a Government Security Audit Teaches us About Password Vulnerabilities Read more
General
General How to Secure the Health Industry Read more
Threats and Attacks
Threats and Attacks Private Keys Vulnerabilities to Side Channel Attacks Read more
Standards and Regulations
Standards and Regulations Navigating the NIST AIM Guidelines Read more
General
General Reddit - Where CISOs Go to Get Hacked Read more
Threats and Attacks
Threats and Attacks SamSam Ransomware: The Enemy of Weak Passwords Read more
Access Management and MFA
Access Management and MFA Before you Get a Physical Security Token - What you Need to Know Read more
Access Management and MFA
Access Management and MFA Using Social Networks as an Identity Provider Read more
Passwordless MFA
Passwordless MFA Windows Hello for Business - Review Read more
Passwordless MFA
Passwordless MFA 6 More Questions About How Passwordless Authentication Work Read more
Passwordless MFA
Passwordless MFA How Does Passwordless Authentication Work? (Part 1) Read more
Access Management and MFA
Access Management and MFA Cloud IAM and How to Choose Your Solution Read more
General
General How to Improve the Security of Active Directory Authentication Read more
General
General The Rise of the e-State - A Story About Estonia Read more
Standards and Regulations
Standards and Regulations Cloud Identity in the Age of GDPR Read more
Threats and Attacks
Threats and Attacks Stopping Man-In-The-Middle Attacks with Cryptography Read more
Passwordless MFA
Passwordless MFA Why Passwordless Authentication is Essential for VPNs Read more
Access Management and MFA
Access Management and MFA What to Look for in Identity and Access Management Solutions? Read more
Access Management and MFA
Access Management and MFA Why Are Software Tokens a Better Option Read more
General
General Circumventing The Single Point of Failure - Goals in Authentication Read more
General
General Zero Knowledge Proof - What Peggy Knows About Victor Read more
General
General What is Zero Trust Authentication? Read more
Standards and Regulations
Standards and Regulations Tackling the PCI's New Authentication Regulations Read more
Standards and Regulations
Standards and Regulations Digital Authentication in the Age of NY's DFS Cyber Regulations Read more
Threats and Attacks
Threats and Attacks How Quantum Computing Could Wreak Havoc on Cryptocurrency Read more
Standards and Regulations
Standards and Regulations Making BYOD Work in the Era of GDPR Read more
Access Management and MFA
Access Management and MFA A Modern Authentication Model for The Financial Industry Read more
Threats and Attacks
Threats and Attacks Blockchain Vulnerability to Man-in-the-middle Attacks Read more
Passwordless MFA
Passwordless MFA Rethinking Adaptive Authentication Read more
General
General What Will Authentication Look Like in 2018 Read more
Standards and Regulations
Standards and Regulations How GDPR Will Change the Face of Digital Authentication Read more
Access Management and MFA
Access Management and MFA Finding the Best Mobile Authentication Solution for your Enterprise Read more
Access Management and MFA
Access Management and MFA What is the Total Cost of Deploying Multi Factor Authentication for your Business? Read more
Passwordless MFA, Threats and Attacks
Passwordless MFA, Threats and Attacks What you need to know about password vulnerabilities (Pt. 2) Read more
Threats and Attacks
Threats and Attacks What you need to know about password vulnerabilities (Pt. 1) Read more
General
General How Push Notifications can Revolutionize your Identity Security Read more
Passwordless MFA
Passwordless MFA Password-Free, High Assurance Authentication for Active Directory Domains Read more
Access Management and MFA
Access Management and MFA The Future of Multi Factor Authentication Read more
General
General A Year in Review: Our achievements of 2017 Read more
Access Management and MFA
Access Management and MFA Taking on the Growing Threat to Identity Security Read more
Access Management and MFA
Access Management and MFA Why your corporate VPN needs two-factor authentication (2FA) Read more
Access Management and MFA
Access Management and MFA Multi Factor Authentication with Office 365 Read more
General
General Achieving Strong Authentication for Online Banking Read more
Access Management and MFA
Access Management and MFA How two-factor authentication hardens the security of digital signatures Read more
Access Management and MFA
Access Management and MFA Customer Authentication Solutions 2017- The Challenge Read more
Access Management and MFA
Access Management and MFA The Case for Securing Remote Access Protocols Through 2FA Read more
Access Management and MFA
Access Management and MFA Survey Maps User Preferences of Leading Authentication Tools Read more
Passwordless MFA
Passwordless MFA The Password is Dead. SMS is deprecated. What’s Next for Authentication? Read more
Access Management and MFA
Access Management and MFA What you need to know on two-factor authentication for your Linux machine Read more
Access Management and MFA
Access Management and MFA What is Federated Identity Management and how to secure it Read more
Standards and Regulations
Standards and Regulations Congressional crackdown on data protection law has begun Read more
Access Management and MFA
Access Management and MFA What you need to know about the security and privacy of face recognition logins Read more
Threats and Attacks
Threats and Attacks The Equifax Breach: How it Went Down Read more
Standards and Regulations
Standards and Regulations The NIST guidelines and what they mean for the future of SMS authentication Read more
Threats and Attacks
Threats and Attacks SS7 – Yet Another Achilles Heal for SMS Authentication Read more
Standards and Regulations
Standards and Regulations What you need to know about the General Data Protection Regulations Read more
Passwordless MFA
Passwordless MFA No-password login: The frictionless and secure alternatives to passwords Read more
General
General The Case for the Secret Sharing Scheme Read more
Access Management and MFA
Access Management and MFA 2017 Phone as an Authenticator; Methods, Benefits and Risks Read more