Secret Double Octopus Wins SINET16 2023 Innovator Award! Read More Here
Search
Menu
Close
Solutions
Open menu
Use Cases
Open menu
Passwordless MFA
Open menu
Desktop MFA
Open menu
Remote Work Security
Open menu
Phishing Resistant MFA
Open menu
Industries
Open menu
Financial Services
Open menu
Industrial Critical Infrastructure
Open menu
Higher Education
Open menu
Passwordless for On-Prem Active Directory and Everything Else
Read Our Solution Overview
Open menu
Product
Open menu
Octopus Platform
Open menu
Overview
Open menu
Integrations
Open menu
Passwordless for On-Prem Active Directory and Everything Else
Read Our Solution Overview
Open menu
Partners
Open menu
Technology
Open menu
View All
Open menu
Channel
Open menu
View All
Open menu
Passwordless for On-Prem Active Directory and Everything Else
Read Our Solution Overview
Open menu
Resources
Open menu
Blog
Open menu
Resource Center
Open menu
Security Wiki
Open menu
ROI Calculator
Open menu
Support Center
Open menu
Passwordless for On-Prem Active Directory and Everything Else
Read Our Solution Overview
Open menu
Company
Open menu
About
Open menu
Events
Open menu
Press Releases
Open menu
Careers
Open menu
Contact Us
Open menu
Passwordless for On-Prem Active Directory and Everything Else
Read Our Solution Overview
Open menu
WHY SDO
Open menu
Get a Demo
Open menu
Blog
The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.
Octocampus
General
Passwords
Access Management and MFA
Passwordless MFA
Standards and Regulations
Threats and Attacks
Solution Brief
eBook
Whitepaper
Case Study
Passwordless MFA
Users Love Passwordless MFA, But the real winner is IT
Read more
Passwordless MFA
What if Windows Doesn’t Say Hello?
Read more
Threats and Attacks
AI to Raise the Stakes for Phishing by 2025 – Take Away Attackers’ Favorite Tool First
Read more
Passwordless MFA
Reputations at Stake: Passwordless MFA Protects Privileged Data On-premises
Read more
Threats and Attacks
The CISO’s MFA dilemma: “Did I do enough to stop a breach?”
Read more
Access Management and MFA
Takepoint Analyst Calls MFA “a Defensive Control” Whose Time Has Come
Read more
Access Management and MFA
Can MFA streamline M&A: Unified login secures access for today’s blended workforce
Read more
Passwordless MFA
High-Assurance MFA for Enterprise: Proximity + Push = Government-Class Login for Privileged Business Users
Read more
Access Management and MFA
Using MFA to Protect Remote Workers Across the VPN
Read more
Access Management and MFA
MFA for Shared Accounts Removes Risk in Critical Industries
Read more
Standards and Regulations
Can Passwordless MFA Make FIDO Work for Enterprise?
Read more
General
The SINET16 Innovator Award Recognizes MFA Innovation
Read more
Access Management and MFA
The Problem With SMS Authentication
Read more
Threats and Attacks
Stop Account Takeover (ATO) With Strong Authentication
Read more
Threats and Attacks
Credential stuffing: What it is, why it works,
and three ways to put an end to it
Read more
Passwordless MFA
Why Passwordless MFA From the CTO's Chair
Read more
Threats and Attacks
How to Protect MFA from SIM Swapping
Read more
Passwordless MFA
Passwordless MFA in An Hour
Read more
Passwordless MFA
Can getting rid of passwords stop ransomware in higher education?
Read more
Passwordless MFA
Three reasons IT leaders aren’t doing passwordless—and why they should
Read more
Access Management and MFA
AuthZ vs AuthN – What is the Difference Exactly?
Read more
Threats and Attacks
Four Simple Ways to Stop All Types of Password Attacks
Read more
Access Management and MFA
2FA vs MFA: What’s the difference—in practice—and how much authentication is enough?
Read more
Passwordless MFA, Threats and Attacks
What is MFA Push Bombing Attack and How to Stop It
Read more
Passwordless MFA
Passwordless MFA for Critical Infrastructure: A Guide to Finding Your Ideal Solution
Read more
Passwordless MFA
Part II: A Practical Path to Passwordless Phishing Resistant MFA
Read more
Passwordless MFA
Rolling out passwordless MFA? Be sure not to leave Linux behind
Read more
Passwordless MFA
Part I: Passwordless Adds Phishing Resistance,But How You Get There Matters
Read more
Passwordless MFA
Critical Infrastructure Can Skip Traditional MFA for Passwordless MFA
Read more
General
ForgeRock and Secret Double Octopus Announce Strategic Partnership
Read more
Passwordless MFA
The ROI Business Case for Funding Passwordless MFA Initiatives
Read more
Passwordless MFA
What is Full Passwordless and What is Not
Read more
General
SDO Wins Another InfoSec Award for Passwordless Authentication
Read more
General
FIDO Passkey Announcement - What's it Mean for the Enterprise?
Read more
Passwordless MFA
Securing Legacy Systems with Passwordless Authentication
Read more
Passwordless MFA
Why Zero Trust Means Zero Passwords
Read more
Passwordless MFA
The Aite 2021 Passwordless Report: Who is "Best in Class"?
Read more
General
5 Major Trends In Cybersecurity Investments
Read more
Passwords
A Sobering Reminder: Passwords are a Threat to Public Infrastructure
Read more
Passwords
Why password policies are a waste of time and money
Read more
Standards and Regulations
Authentication and government contracts: the password requirements of NIST and DFARS
Read more
Passwords
Corporate credentials for sale in the dark web
Read more
General
Avoiding the Help Desk Backlog
Read more
Passwords
When it comes to passwords, even the tech giants mess up
Read more
General
Best of 2020: Our most-read blogs of the year
Read more
General
5G Networks and the Future of Authentication
Read more
General
Where should CISOs put their money in 2021?
Read more
General
Small business security: to MSSP or not to MSSP?
Read more
Access Management and MFA
Single Sign-On - How Does it Work and What is Passwordless SSO?
Read more
Access Management and MFA
Are 2FA and MFA an Answer to Password Fatigue?
Read more
Standards and Regulations
What is SAML and how is it being used?
Read more
Threats and Attacks
Top 6 Password Attacks and How to Prevent Them
Read more
Threats and Attacks
The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them
Read more
Access Management and MFA
Securing Remote Access Users
Read more
Threats and Attacks
Fight Insider Threats with Passwordless Authentication
Read more
Standards and Regulations
Your Complete Guide to FIDO, FIDO2 and WebAuthn
Read more
General
3 Pillars of Digital Transformation: Cost, Usability, and Security
Read more
Passwords
How to handle passwords under GDPR
Read more
Passwords
Put a PIN in that: why passwords vs. PINs comparisons are irrelevant
Read more
General
Getting back to normal: secure work in a post-coronavirus world
Read more
Passwordless MFA
LDAP, Active Directory and Federated Identity: What You Need to Know
Read more
Passwordless MFA
2FA VS Passwordless Authentication - Equal Enterprise Security?
Read more
Threats and Attacks
Supply Chain attacks: mitigating hidden risks with Passwordless Authentication
Read more
Threats and Attacks
Universities and Cyber Security: A Lesson From Iranian Hackers
Read more
Access Management and MFA
The Future of Corporate VPN
Read more
General
10 Security Tips For The Remote Workforce
Read more
General
Enabling Remote Work While Ensuring Maximum Security
Read more
Access Management and MFA
Software Tokens Vs Hardware Tokens
Read more
Access Management and MFA
Active Directory In The Age Of The Cloud
Read more
Threats and Attacks
SIM Swapping – The End Of 2nd Factor Authentication?
Read more
General
Cloud Identity Management Challenges
Read more
Standards and Regulations
Authentication Federation VS Single Sign-On
Read more
Threats and Attacks
State Sponsored Identity Breaches
Read more
Threats and Attacks
Bypassing 2FA
Read more
Passwords
True Cost of Password Based Authentication
Read more
Threats and Attacks
The Ultimate Solution For Credential Stuffing Attacks
Read more
General
On-Premise Plus Cloud = The Hybrid Approach
Read more
Passwords
In Passwords We Trust! But Why?
Read more
Threats and Attacks
Astaroth - The Great Duke of Hell
Read more
Passwordless MFA
Every Password Matters - The PCM Case
Read more
Threats and Attacks
GoldBrute - The Enemy of RDP
Read more
General, Threats and Attacks
How Poor Passwords Turned 50,000 Servers Into Cryptocurrency Miners
Read more
General, Threats and Attacks
The Verizon Breach Report - 4 Things Learned
Read more
Passwordless MFA
Authenticating Humans While Removing the Human Factor
Read more
Access Management and MFA
Shared Account Authentication - Solved!
Read more
Passwordless MFA
Password Mangers Vs. Passwordless Authentication
Read more
Threats and Attacks
Solving Phishing from the Root
Read more
Passwords
The State of Credentials
Read more
Threats and Attacks
Password Spraying - The Citrix Breach
Read more
Threats and Attacks
Big Credential Breaches
Read more
Standards and Regulations
Establishing strong authentication for PSD2
Read more
Access Management and MFA
Securing Remote Access - The Guide
Read more
Access Management and MFA
How to Evaluate Push Authentication Solutions
Read more
Threats and Attacks
Preventing Corporate Account Takeover (CATO)
Read more
General
What will Authentication Look Like in 2019
Read more
Access Management and MFA
Virtual Desktop (VDI) Authentication
Read more
Threats and Attacks
Privileged Users are Privileged Targets
Read more
Threats and Attacks
Credential Stuffing - HSBC Case Study
Read more
Access Management and MFA
VPN MFA - The Gateway to the Kingdom
Read more
Standards and Regulations
Understanding Today's Data Regulations (Part 2)
Read more
Standards and Regulations
Understanding Today's Data Regulations Pt.1
Read more
General
Certificates and Inherit Trust
Read more
General
Practice What you Preach - IT's Achilles Heel
Read more
Passwords
What a Government Security Audit Teaches us About Password Vulnerabilities
Read more
General
How to Secure the Health Industry
Read more
Standards and Regulations
Navigating the NIST AIM Guidelines
Read more
General
Reddit - Where CISOs Go to Get Hacked
Read more
Threats and Attacks
SamSam Ransomware: The Enemy of Weak Passwords
Read more
Access Management and MFA
Before you Get a Physical Security Token - What you Need to Know
Read more
Access Management and MFA
Using Social Networks as an Identity Provider
Read more
Passwordless MFA
Windows Hello for Business - Review
Read more
Passwordless MFA
6 More Questions About How Passwordless Authentication Work
Read more
Passwordless MFA
How Does Passwordless Authentication Work? (Part 1)
Read more
General
How to Improve the Security of Active Directory Authentication
Read more
General
The Rise of the e-State - A Story About Estonia
Read more
Standards and Regulations
Cloud Identity in the Age of GDPR
Read more
Passwordless MFA
Why Passwordless Authentication is Essential for VPNs
Read more
Access Management and MFA
What to Look for in Identity and Access Management Solutions?
Read more
Access Management and MFA
Why Are Software Tokens a Better Option
Read more
General
Zero Knowledge Proof - What Peggy Knows About Victor
Read more
General
What is Zero Trust Authentication?
Read more
Standards and Regulations
Tackling the PCI's New Authentication Regulations
Read more
Standards and Regulations
Digital Authentication in the Age of NY's DFS Cyber Regulations
Read more
Threats and Attacks
How Quantum Computing Could Wreak Havoc on Cryptocurrency
Read more
Standards and Regulations
Making BYOD Work in the Era of GDPR
Read more
Access Management and MFA
A Modern Authentication Model for The Financial Industry
Read more
Threats and Attacks
Blockchain Vulnerability to Man-in-the-middle Attacks
Read more
Passwordless MFA
Rethinking Adaptive Authentication
Read more
General
What Will Authentication Look Like in 2018
Read more
Standards and Regulations
How GDPR Will Change the Face of Digital Authentication
Read more
Access Management and MFA
Finding the Best Mobile Authentication Solution for your Enterprise
Read more
Access Management and MFA
What is the Total Cost of Deploying Multi Factor Authentication for your Business?
Read more
Passwordless MFA, Threats and Attacks
What you need to know about password vulnerabilities (Pt. 2)
Read more
Threats and Attacks
What you need to know about password vulnerabilities (Pt. 1)
Read more
General
How Push Notifications can Revolutionize your Identity Security
Read more
Access Management and MFA
The Future of Multi Factor Authentication
Read more
General
A Year in Review: Our achievements of 2017
Read more
Access Management and MFA
Taking on the Growing Threat to Identity Security
Read more
Access Management and MFA
Why your corporate VPN needs two-factor authentication (2FA)
Read more
Access Management and MFA
Multi Factor Authentication with Office 365
Read more
General
Achieving Strong Authentication for Online Banking
Read more
Access Management and MFA
How two-factor authentication hardens the security of digital signatures
Read more
Access Management and MFA
Customer Authentication Solutions 2017- The Challenge
Read more
Access Management and MFA
The Case for Securing Remote Access Protocols Through 2FA
Read more
Access Management and MFA
Survey Maps User Preferences of Leading Authentication Tools
Read more
Access Management and MFA
What is Federated Identity Management and how to secure it
Read more
Standards and Regulations
Congressional crackdown on data protection law has begun
Read more
Access Management and MFA
What you need to know about the security and privacy of face recognition logins
Read more
Threats and Attacks
The Equifax Breach: How it Went Down
Read more
Threats and Attacks
SS7 – Yet Another Achilles Heal for SMS Authentication
Read more
Standards and Regulations
What you need to know about the General Data Protection Regulations
Read more
Passwordless MFA
No-password login: The frictionless and secure alternatives to passwords
Read more
General
The Case for the Secret Sharing Scheme
Read more
Access Management and MFA
2017 Phone as an Authenticator; Methods, Benefits and Risks
Read more