About Secret Double Octopus Staff

This author has not yet filled in any details.
So far Secret Double Octopus Staff has created 28 blog entries.

Secret Double Octopus Among CIO’s 20 Most Promising Identity Governance Solution Providers

Eighty percent of hacking-related breaches exploit stolen or weak passwords. Even worse, current security practices of token-based authentication in the form of OTPs and SMS have also been compromised. These challenges are compelling organizations to adopt new approaches to securing their data, systems and overall business interests. Secret Double Octopus, a prominent player in password-free authentication, protects data, systems and identities [...]

By | 2017-11-20T11:59:36+00:00 November 20th, 2017|Categories: News|Tags: , , |

Secret Double Octopus Survey Examines User Preferences for Password Alternatives

Tel Aviv, Israel- October 30, 2017- The results of a survey conducted by Secret Double Octopus, the pioneer of password-free, keyless authentication technology, found that among employees of medium (1000-5000) and large (5000+) enterprises, 81% of respondents perceive Face ID as trustworthy and 91% think it will be easy to use. Currently, Touch ID is the leading alternative to passwords with [...]

Secret Double Octopus Selected as Top Cybersecurity Company on Momentum Partners’ Q3 2017 Watch List

Tel Aviv, Israel- October 24, 2017- Secret Double Octopus, the pioneer of password-free, keyless authentication technology authentication technology, announced today it was chosen as a top cybersecurity company by Momentum Partners based off of the firm’s analysis of industry trends and current innovation in cybersecurity issues. Each quarter, Momentum Partners, a Silicon Valley-based cybersecurity investment bank, selects 10 companies for its [...]

By | 2017-10-29T12:42:57+00:00 October 24th, 2017|Categories: Press Release|Tags: , , , |

Equifax data breach is latest reminder of security lessons

Published in The Hill on September 8, 2017 by Raz Rafaeli The Equifax data breach this week has quickly become recognized as the quite possibly the worst breach in history. Although other hacks dwarf the Equifax incident in sheer size and volume, the Equifax breach is particularly severe due to the breathtaking amount of highly sensitive data it has left open to criminals. The [...]

By | 2017-10-29T16:30:18+00:00 September 27th, 2017|Categories: News|Tags: , , |

What’s the difference between authentication and authorization?

In order to protect sensitive data and operations from unwanted access by intruders and malicious actors, developers integrated authentication and authorization features into their applications. Whether you’re running a banking app, a social media website or a blogging platform, these are the two key functionalities that will seal your application against security incidents. While the two terms are often used interchangeably, [...]