Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.

Passwordless MFA
Passwordless MFA Halfway Security Is No Security: When Windows Hello Leaves the Door Open Halfway Security Is No Security: When Windows Hello Leaves the Door Open
Standards and Regulations
Standards and Regulations CISO Insights: How Financial Orgs Can Tackle MFA Compliance at Scale CISO Insights: How Financial Orgs Can Tackle MFA Compliance at Scale
Passwordless MFA
Passwordless MFA Passwordless Authentication Helps Law Firms Maximize Security— and Billable Hours  Passwordless Authentication Helps Law Firms Maximize Security— and Billable Hours 
Access Management and MFA
Access Management and MFA The Future of SSO: Passwordless for Everything in the Enterprise The Future of SSO: Passwordless for Everything in the Enterprise
Passwordless MFA
Passwordless MFA Enterprises Can Improve VDI Security with MFA Enterprises Can Improve VDI Security with MFA
Standards and Regulations
Standards and Regulations How to Achieve NYDFS MFA Compliance How to Achieve NYDFS MFA Compliance
Passwordless MFA
Passwordless MFA Octopus Lets Financial Firm Use FIDO to Harden RDP Security  Octopus Lets Financial Firm Use FIDO to Harden RDP Security 
General
General A Guide to Phishing Resistant MFA For Enterprises A Guide to Phishing Resistant MFA For Enterprises
Standards and Regulations
Standards and Regulations FIDO Authentication Guide: Passkeys & WebAuthn Explained FIDO Authentication Guide: Passkeys & WebAuthn Explained
Passwordless MFA
Passwordless MFA Understanding Passwordless Authentication for Businesses Understanding Passwordless Authentication for Businesses
Standards and Regulations
Standards and Regulations Can Passwordless MFA Make FIDO Work for Enterprise? Can Passwordless MFA Make FIDO Work for Enterprise?
General
General Modernize ADFS Authentication: Securing User Login with Ease Modernize ADFS Authentication: Securing User Login with Ease
Access Management and MFA
Access Management and MFA Shared Accounts: Can Passwordless Authentication Make Them Secure? Shared Accounts: Can Passwordless Authentication Make Them Secure?
General
General FIDO Passkey Announcement – What’s it Mean for the Enterprise? FIDO Passkey Announcement – What’s it Mean for the Enterprise?
Threats and Attacks
Threats and Attacks How to Avoid MFA Fatigue and Prevent Attacks How to Avoid MFA Fatigue and Prevent Attacks
Passwordless MFA
Passwordless MFA Iconic Financial Service Provider Secures Customer Data and VDI with the Octopus Iconic Financial Service Provider Secures Customer Data and VDI with the Octopus
Threats and Attacks
Threats and Attacks IBM Data Breach Report Shows Credential-based Attack Costs on the Rise IBM Data Breach Report Shows Credential-based Attack Costs on the Rise
General
General KDDI Launches Enterprise Passwordless MFA Service KDDI Launches Enterprise Passwordless MFA Service
Threats and Attacks
Threats and Attacks How to Stop Hackers from Bypassing 2FA How to Stop Hackers from Bypassing 2FA
General
General Hot Cloud Failover to On-Prem Authentication Hot Cloud Failover to On-Prem Authentication
Standards and Regulations
Standards and Regulations MFA Can’t Fulfill the Promise of Zero Trust— but Passwordless MFA Can MFA Can’t Fulfill the Promise of Zero Trust— but Passwordless MFA Can
Passwordless MFA
Passwordless MFA You Rolled Out MFA and Still Got Phished – Now What? You Rolled Out MFA and Still Got Phished – Now What?
Access Management and MFA
Access Management and MFA AuthZ vs AuthN – What is the Difference Exactly? AuthZ vs AuthN – What is the Difference Exactly?
Access Management and MFA
Access Management and MFA Can MFA Secure Remote Access to Critical Infrastructure? Can MFA Secure Remote Access to Critical Infrastructure?
Threats and Attacks
Threats and Attacks Phishing 2024: Vishing, Smishing and Quishing – AI!  Phishing 2024: Vishing, Smishing and Quishing – AI! 
Passwordless MFA
Passwordless MFA How Passwordless solves the “Identity Crisis” in banking How Passwordless solves the “Identity Crisis” in banking
Access Management and MFA
Access Management and MFA Octopus Helps NY Law Firm Deliver Secure “White Glove” IT Support Octopus Helps NY Law Firm Deliver Secure “White Glove” IT Support
Passwordless MFA
Passwordless MFA Users Love Passwordless MFA, But the real winner is IT Users Love Passwordless MFA, But the real winner is IT
Passwordless MFA
Passwordless MFA What if Windows Doesn’t Say Hello? What if Windows Doesn’t Say Hello?
Threats and Attacks
Threats and Attacks AI is Making Phishing Worse – Here’s How to Stop It AI is Making Phishing Worse – Here’s How to Stop It
Passwordless MFA
Passwordless MFA Protect Privileged Data On-premises with Passwordless MFA Protect Privileged Data On-premises with Passwordless MFA
Threats and Attacks
Threats and Attacks The CISO’s MFA dilemma: “Did I do enough to stop a breach?” The CISO’s MFA dilemma: “Did I do enough to stop a breach?”
Access Management and MFA
Access Management and MFA Takepoint Analyst Calls MFA “a Defensive Control” Whose Time Has Come Takepoint Analyst Calls MFA “a Defensive Control” Whose Time Has Come
Access Management and MFA
Access Management and MFA Can Passwordless MFA Streamline M&A? Can Passwordless MFA Streamline M&A?
General, Passwordless MFA
General, Passwordless MFA The Pros and Cons of Okta FastPass for Passwordless Authentication The Pros and Cons of Okta FastPass for Passwordless Authentication
Passwordless MFA
Passwordless MFA High-Assurance MFA for Enterprise: Proximity + Push High-Assurance MFA for Enterprise: Proximity + Push
Access Management and MFA
Access Management and MFA Using MFA to Protect Remote Workers Across the VPN Using MFA to Protect Remote Workers Across the VPN
Access Management and MFA
Access Management and MFA MFA for Shared Accounts Removes Risk in Critical Industries MFA for Shared Accounts Removes Risk in Critical Industries
General
General The SINET16 Innovator Award Recognizes MFA Innovation The SINET16 Innovator Award Recognizes MFA Innovation
Access Management and MFA
Access Management and MFA The Problem With SMS Authentication The Problem With SMS Authentication
Passwordless MFA
Passwordless MFA Windows Hello for Business – Review Windows Hello for Business – Review
Threats and Attacks
Threats and Attacks Stop Account Takeover (ATO) With Strong Authentication Stop Account Takeover (ATO) With Strong Authentication
Threats and Attacks
Threats and Attacks Understanding Credential Stuffing Understanding Credential Stuffing
Passwordless MFA
Passwordless MFA Why Passwordless MFA From the CTO’s Chair Why Passwordless MFA From the CTO’s Chair
Threats and Attacks
Threats and Attacks How to Protect MFA from SIM Swapping How to Protect MFA from SIM Swapping
Passwordless MFA
Passwordless MFA Can getting rid of passwords stop ransomware in higher education? Can getting rid of passwords stop ransomware in higher education?
Passwordless MFA
Passwordless MFA Three reasons IT leaders aren’t doing passwordless—and why they should Three reasons IT leaders aren’t doing passwordless—and why they should
Threats and Attacks
Threats and Attacks Four Simple Ways to Stop All Types of Password Attacks Four Simple Ways to Stop All Types of Password Attacks
Access Management and MFA
Access Management and MFA 2FA vs MFA: Practical Differences 2FA vs MFA: Practical Differences
Passwordless MFA
Passwordless MFA What is MFA Push Bombing Attack and How to Stop It What is MFA Push Bombing Attack and How to Stop It
Passwordless MFA
Passwordless MFA Ensuring MFA for Linux in Passwordless MFA Rollouts Ensuring MFA for Linux in Passwordless MFA Rollouts
Passwordless MFA
Passwordless MFA Critical Infrastructure Can Skip Traditional MFA for Passwordless MFA Critical Infrastructure Can Skip Traditional MFA for Passwordless MFA
General
General ForgeRock and Secret Double Octopus Announce Strategic Partnership ForgeRock and Secret Double Octopus Announce Strategic Partnership
Passwordless MFA
Passwordless MFA What is Full Passwordless and What is Not What is Full Passwordless and What is Not
General
General SDO Wins Another InfoSec Award for Passwordless Authentication SDO Wins Another InfoSec Award for Passwordless Authentication
Passwordless MFA
Passwordless MFA Securing Legacy Systems with Passwordless Authentication Securing Legacy Systems with Passwordless Authentication
Passwordless MFA
Passwordless MFA Why Zero Trust Means Zero Passwords Why Zero Trust Means Zero Passwords
Passwordless MFA
Passwordless MFA The Aite 2021 Passwordless Report: Who is “Best in Class”? The Aite 2021 Passwordless Report: Who is “Best in Class”?
Passwords
Passwords Why password policies are a waste of time and money Why password policies are a waste of time and money
Standards and Regulations
Standards and Regulations Security in Government Contracts: NIST and DFARS Password Requirements Security in Government Contracts: NIST and DFARS Password Requirements
Passwords
Passwords Corporate credentials for sale in the dark web Corporate credentials for sale in the dark web
General
General Avoiding the Help Desk Backlog Avoiding the Help Desk Backlog
Passwords
Passwords When it comes to passwords, even the tech giants mess up  When it comes to passwords, even the tech giants mess up 
General
General 5G Networks and the Future of Authentication 5G Networks and the Future of Authentication
General
General Small business security: to MSSP or not to MSSP? Small business security: to MSSP or not to MSSP?
Access Management and MFA
Access Management and MFA Single Sign-On – How Does it Work and What is Passwordless SSO? Single Sign-On – How Does it Work and What is Passwordless SSO?
Standards and Regulations
Standards and Regulations What is SAML and how is it being used? What is SAML and how is it being used?
Threats and Attacks
Threats and Attacks Top 6 Password Attacks and How to Prevent Them Top 6 Password Attacks and How to Prevent Them
Threats and Attacks
Threats and Attacks The Ultimate Guide to Man in the Middle (MITM) Attacks The Ultimate Guide to Man in the Middle (MITM) Attacks
Threats and Attacks
Threats and Attacks Fight Insider Threats with Passwordless Authentication  Fight Insider Threats with Passwordless Authentication 
Passwords
Passwords How to handle passwords under GDPR How to handle passwords under GDPR
Passwords
Passwords Put a PIN in that: why passwords vs. PINs comparisons are irrelevant Put a PIN in that: why passwords vs. PINs comparisons are irrelevant
Passwordless MFA
Passwordless MFA LDAP, Active Directory and Federated Identity: What You Need to Know LDAP, Active Directory and Federated Identity: What You Need to Know
Passwordless MFA
Passwordless MFA Passwordless vs 2FA: Which is Safer for Enterprises? Passwordless vs 2FA: Which is Safer for Enterprises?
Threats and Attacks
Threats and Attacks Mitigating Supply Chain Risks with Passwordless Authentication Mitigating Supply Chain Risks with Passwordless Authentication
Access Management and MFA
Access Management and MFA The Future of Corporate VPN The Future of Corporate VPN
General
General Enabling Remote Work While Ensuring Maximum Security Enabling Remote Work While Ensuring Maximum Security
Access Management and MFA
Access Management and MFA Software Tokens Vs Hardware Tokens Software Tokens Vs Hardware Tokens
Access Management and MFA
Access Management and MFA Active Directory In The Age Of The Cloud Active Directory In The Age Of The Cloud
Threats and Attacks
Threats and Attacks SIM Swapping – The End Of 2nd Factor Authentication? SIM Swapping – The End Of 2nd Factor Authentication?
General
General Cloud Identity Management Challenges Cloud Identity Management Challenges
Standards and Regulations
Standards and Regulations Authentication Federation VS Single Sign-On Authentication Federation VS Single Sign-On
Passwords
Passwords True Cost of Password Based Authentication True Cost of Password Based Authentication
General
General On-Premise Plus Cloud = The Hybrid Approach On-Premise Plus Cloud = The Hybrid Approach
Threats and Attacks
Threats and Attacks Astaroth – The Great Duke of Hell Astaroth – The Great Duke of Hell
Access Management and MFA
Access Management and MFA Shared Account Authentication – Solved! Shared Account Authentication – Solved!
Threats and Attacks
Threats and Attacks Big Credential Breaches Big Credential Breaches
Standards and Regulations
Standards and Regulations Establishing strong authentication for PSD2 Establishing strong authentication for PSD2
Access Management and MFA
Access Management and MFA Securing Remote Access – The Guide Securing Remote Access – The Guide
Threats and Attacks
Threats and Attacks Preventing Corporate Account Takeover (CATO) Preventing Corporate Account Takeover (CATO)
Access Management and MFA
Access Management and MFA Virtual Desktop (VDI) Authentication Virtual Desktop (VDI) Authentication
Threats and Attacks
Threats and Attacks Privileged Users are Privileged Targets Privileged Users are Privileged Targets
Threats and Attacks
Threats and Attacks Credential Stuffing – HSBC Case Study Credential Stuffing – HSBC Case Study
Access Management and MFA
Access Management and MFA VPN MFA – The Gateway to the Kingdom VPN MFA – The Gateway to the Kingdom
General
General Certificates and Inherit Trust Certificates and Inherit Trust
General
General How to Secure the Health Industry How to Secure the Health Industry
Standards and Regulations
Standards and Regulations Navigating the NIST AIM Guidelines Navigating the NIST AIM Guidelines
Access Management and MFA
Access Management and MFA Before you Get a Physical Security Token – What you Need to Know Before you Get a Physical Security Token – What you Need to Know
Passwordless MFA
Passwordless MFA 6 More Questions About How Passwordless Authentication Work 6 More Questions About How Passwordless Authentication Work
Passwordless MFA
Passwordless MFA How Does Passwordless Authentication Work? (Part 1) How Does Passwordless Authentication Work? (Part 1)
General
General How to Improve the Security of Active Directory Authentication How to Improve the Security of Active Directory Authentication
Passwordless MFA
Passwordless MFA Embracing Passwordless VPN for Secure Remote Access Embracing Passwordless VPN for Secure Remote Access
Access Management and MFA
Access Management and MFA What to Look for in Identity and Access Management Solutions? What to Look for in Identity and Access Management Solutions?
Access Management and MFA
Access Management and MFA Why Are Software Tokens a Better Option Why Are Software Tokens a Better Option
General
General What is Zero Trust Authentication? What is Zero Trust Authentication?
Standards and Regulations
Standards and Regulations Tackling the PCI’s New Authentication Regulations Tackling the PCI’s New Authentication Regulations
Standards and Regulations
Standards and Regulations Making BYOD Work in the Era of GDPR Making BYOD Work in the Era of GDPR
Access Management and MFA
Access Management and MFA A Modern Authentication Model for The Financial Industry A Modern Authentication Model for The Financial Industry
Threats and Attacks
Threats and Attacks Blockchain Vulnerability to Man-in-the-middle Attacks Blockchain Vulnerability to Man-in-the-middle Attacks
Access Management and MFA
Access Management and MFA Finding the Best Mobile Authentication Solution for your Enterprise Finding the Best Mobile Authentication Solution for your Enterprise
Access Management and MFA
Access Management and MFA Total Cost of Deploying Multi-Factor Authentication Total Cost of Deploying Multi-Factor Authentication
General
General How Push Notifications can Revolutionize your Identity Security How Push Notifications can Revolutionize your Identity Security
Access Management and MFA
Access Management and MFA The Future of Multi Factor Authentication The Future of Multi Factor Authentication
Access Management and MFA
Access Management and MFA Why your corporate VPN needs two-factor authentication (2FA) Why your corporate VPN needs two-factor authentication (2FA)
Access Management and MFA
Access Management and MFA Two-Factor Authentication: Enhancing Digital Signature Security Two-Factor Authentication: Enhancing Digital Signature Security
Access Management and MFA
Access Management and MFA The Case for Securing Remote Access Protocols Through 2FA The Case for Securing Remote Access Protocols Through 2FA
Access Management and MFA
Access Management and MFA What is Federated Identity Management and how to secure it What is Federated Identity Management and how to secure it
Threats and Attacks
Threats and Attacks SS7 – Yet Another Achilles Heal for SMS Authentication SS7 – Yet Another Achilles Heal for SMS Authentication
12314