Corporate credentials for sale in the dark web

By Shimrit Tzur-David|March 3rd, 2021|Categories: Articles|

Corporate credentials for sale in the dark web: how to protect your users and data Passwords of corporate employees are valuable. However, despite organizations’ best efforts to protect their systems, user credentials keep ending up on the Dark Web forums for sale. Credentials are targeted in a wide range of attacks, from simple phishing to complicated brute-force attacks. Every year brings [...]

Why password policies are a waste of time and money

By Inbal Voitiz|February 21st, 2021|Categories: Articles|

Every year, billions of personal and corporate accounts get hacked. And every year, organizations respond in the same way: Enforcing stricter password policies. The result? A false sense of accomplishment and a short-lived boost to security, followed by a return to the usual: insecure passwords and, of course, more compromised accounts. In this post, we will examine why password policies are [...]

How the COVID pandemic can help digital transformation 

By Raz Rafaeli|February 8th, 2021|Categories: Articles|

As the world continues to fight the coronavirus pandemic, we are all learning new lessons. Many people and organizations will suffer losses, some will come out winners. But in the end, everyone will change.  As the virus is gradually subdued, life will almost return to normal. Quarantines will be lifted and the economy will eventually rebound. But the pandemic will leave longer lasting [...]

How Passwordless Advanced in 2020 and Where It’s Headed

By Raz Rafaeli|January 28th, 2021|Categories: Articles|

From the security dynamics of remote work to continued security breaches and phishing campaigns, 2020 was an eccentric year highlighting the skyrocketing need for better identity and authentication solutions in the business sector more than ever. As we take a look back at a year rife with a threat landscape for enterprise companies, it’s prime time to examine the advances in [...]

Authentication and government contracts: the password requirements of NIST and DFARS

By Raz Rafaeli|January 17th, 2021|Categories: Articles|

Government contracts can be very attractive for organizations of any size. A testament to the fact is the fierce competition between large tech companies to win the bid for the Department of Defense’s (DoD) JEDI project, worth over $10 billion. But public sector contracts have their own set of caveats and sensibilities, and not taking them into consideration can land an [...]

When it comes to passwords, even the tech giants mess up 

By Shimrit Tzur-David|January 7th, 2021|Categories: Articles|

We trust internet giants with some of our most sensitive information: personal and business communications, documents, financial transactions, social and dating profiles, medical information and the list grows with every new feature and service we're offered. But this incredible new level of trust in corporations comes with an often-overlooked dark side. In many cases, the only thing standing between evil hackers [...]

2020 in review: A year to remember

By Secret Double Octopus Staff|December 31st, 2020|Categories: Articles|

2020 has been a year to remember, that we can all agree on. The global effects brought to us by the COVID-19 pandemic registered significant changes we all experienced in our personal and professional life, including the unprecedented rise in work-from-home and an ever-growing dependency on the digital world. For the Cyber industry, the global changes have on the one hand [...]

Best of 2020: Our most-read blogs of the year

By Secret Double Octopus Staff|December 29th, 2020|Categories: Articles|

This year has been like no other, but our amazing staff stayed focused on securing your domain amid all the unexpected changes. And while COVID-19 and its effects on the workplace were hot topics in many circles, our readers mainly wanted interesting and useful guides to the world of passwordless. Here are the stars of 2020 in our blog:     [...]

5G Networks and the Future of Authentication

By Shimrit Tzur-David|December 17th, 2020|Categories: Articles|

One of the most promising technological advances of the decade is the debut of the fifth generation of mobile networks, 5G. The huge promise of 5G is due to its ability to provide ubiquitous internet coverage at ultra-speeds (~20 Gbps), with high capacity and very low latency.   The advent of 5G will pave the way for new applications in many different domains, including the internet of things (IoT), [...]

Where should CISOs put their money in 2021?

By Inbal Voitiz|December 3rd, 2020|Categories: Articles|

CISOs undeniably faced a new hosting of challenges across the board this year due to the global pandemic. As we approach the end of the year, not only is it a good time to reflect on the past year but prepare for what the foreseeable future holds for enterprise cybersecurity. As enterprises continue to adjust transition to the reality of remote [...]

Emotet is back, and it’s after your passwords!

By Shimrit Tzur-David|November 22nd, 2020|Categories: Articles|

Just when we thought 2020 couldn’t get any worse, the U.S. Department of Homeland Security (DHS) declared that Emotet, a strain of malware (and a cybercrime operation allegedly directed by Russian hackers) that has existed since 2014, has seen a resurgence of activity. DHS describes Emotet as “one of the most prevalent ongoing threats” that is targeting various organizations, especially “state [...]

Small business security: to MSSP or not to MSSP?

By Or Finkelstein|November 12th, 2020|Categories: Articles|

For most of human history, small business owners had to worry about one thing and one thing only: establishing and growing the business. Today, it is no longer the case.  Digital transformation has changed everything, including the world of cybercrime.   Attacks on large organizations and government entities may dominate the news, but small businesses are more vulnerable to an attack. Less [...]

Authentication vs. Authorization – What is the Difference Exactly?

By Inbal Voitiz|November 5th, 2020|Categories: Articles|

The distinction between authentication and authorization is many times missed or confused. Some of the confusion has to do with the fact that the short form for authentication and authorization is the same - “auth” - so a delegated authorization scheme like OAUTH can be easily confused with something that has to do with authentication. But authentication and authorization are really [...]

x

Get in Touch

x

Get in Touch With Sales