The Octopus Blog

The Aite 2021 Passwordless Report: Who is “Best in Class”?

By Raz Rafaeli|June 2nd, 2021|Categories: Articles|

The passwordless authentication market is fast-growing, and it is becoming increasingly affordable and easy to deploy identity access management that do away with passwords. But with so many providers and technologies, how do you make sure to choose the right solution for your enterprise? Recently, Aite Group, a business and technology advisory with offices in U.S. and UK, selected Secret Double [...]

5 Major Trends In Cybersecurity Investments

By Raz Rafaeli|May 19th, 2021|Categories: Articles|

With the FBI reporting an over 400% increase in the level of cybercrime in 2020 and the year ending with a massive government data breach, 2020 has brought cybersecurity to the forefront of most people's minds. However, while this year saw cybersecurity become a key operational priority for the majority of businesses, effective cybersecurity technologies and solutions will remain vital in [...]

A Sobering Reminder: Passwords are a Threat to Public Infrastructure

By Shimrit Tzur-David|May 6th, 2021|Categories: Articles|

User-Managed Passwords are a Massive Threat to Public Infrastructure With this year’s World Password Day upon us, it’s high time to take a good look at the critical infrastructure sector and the password-related security vulnerabilities that are in dire need of updating. While modern utility systems become increasingly digitally connected, cyber criminals and the threat landscape are growing in sophistication.   While [...]

Why password policies are a waste of time and money

By Inbal Voitiz|April 21st, 2021|Categories: Articles|

Every year, billions of personal and corporate accounts get hacked. And every year, organizations respond in the same way: Enforcing stricter password policies. The result? A false sense of accomplishment and a short-lived boost to security, followed by a return to the usual: insecure passwords and, of course, more compromised accounts. In this post, we will examine why password policies are [...]

Cybersecurity in 2021: betting big on identity and authentication

By Shimrit Tzur-David|April 8th, 2021|Categories: Articles|

2020 was a year of accelerated digital transformation with Covid-10 related lockdowns pushing pre-existing trends into overdrive. We saw more quantum leaps in cloud adoption, remote work, and digital transformation in a single year than we saw in a decade.  Naturally, this shakeup has caused a near-perfect storm in the world of cybersecurity. Threat actors have, by extension, expanded their hunting [...]

Cyberwarfare took a leap in 2020 and the industry needs a new approach

By Shimrit Tzur-David|March 22nd, 2021|Categories: Articles|

Just when we thought 2020 couldn’t get worse, security firm Mandiant FireEye broke the news that a vulnerability in the software of IT solutions provider SolarWinds had resulted in a massive security breach across the public and private sector, targeting dozens of companies and government agencies, including the U.S. Departments of Commerce, Treasury, Justice, Defense, and the Center for Disease Control. [...]

Authentication and government contracts: the password requirements of NIST and DFARS

By Raz Rafaeli|March 12th, 2021|Categories: Articles|

Government contracts can be very attractive for organizations of any size. A testament to the fact is the fierce competition between large tech companies to win the bid for the Department of Defense’s (DoD) JEDI project, worth over $10 billion. But public sector contracts have their own set of caveats and sensibilities, and not taking them into consideration can land an [...]

Corporate credentials for sale in the dark web

By Shimrit Tzur-David|March 3rd, 2021|Categories: Articles|

Corporate credentials for sale in the dark web: how to protect your users and data Passwords of corporate employees are valuable. However, despite organizations’ best efforts to protect their systems, user credentials keep ending up on the Dark Web forums for sale. Credentials are targeted in a wide range of attacks, from simple phishing to complicated brute-force attacks. Every year brings [...]

Avoiding the Help Desk Backlog

By Raz Rafaeli|February 21st, 2021|Categories: Articles|

Settling back into work after the holiday season is a challenge for any employee. However, for IT professionals, the new year can be an incredibly stressful time. As employees return to work, they inevitably subject help desks with a barrage of new support tickets while simultaneously opening up potential cybersecurity weaknesses. In 2021, this scenario is likely to be compounded by [...]

How the COVID pandemic can help digital transformation 

By Raz Rafaeli|February 8th, 2021|Categories: Articles|

As the world continues to fight the coronavirus pandemic, we are all learning new lessons. Many people and organizations will suffer losses, some will come out winners. But in the end, everyone will change.  As the virus is gradually subdued, life will almost return to normal. Quarantines will be lifted and the economy will eventually rebound. But the pandemic will leave longer lasting [...]

How Passwordless Advanced in 2020 and Where It’s Headed

By Raz Rafaeli|January 28th, 2021|Categories: Articles|

From the security dynamics of remote work to continued security breaches and phishing campaigns, 2020 was an eccentric year highlighting the skyrocketing need for better identity and authentication solutions in the business sector more than ever. As we take a look back at a year rife with a threat landscape for enterprise companies, it’s prime time to examine the advances in [...]

When it comes to passwords, even the tech giants mess up 

By Shimrit Tzur-David|January 7th, 2021|Categories: Articles|

We trust internet giants with some of our most sensitive information: personal and business communications, documents, financial transactions, social and dating profiles, medical information and the list grows with every new feature and service we're offered. But this incredible new level of trust in corporations comes with an often-overlooked dark side. In many cases, the only thing standing between evil hackers [...]

2020 in review: A year to remember

By Secret Double Octopus Staff|December 31st, 2020|Categories: Articles|

2020 has been a year to remember, that we can all agree on. The global effects brought to us by the COVID-19 pandemic registered significant changes we all experienced in our personal and professional life, including the unprecedented rise in work-from-home and an ever-growing dependency on the digital world. For the Cyber industry, the global changes have on the one hand [...]

x

Get in Touch

x

Get in Touch With Sales