The Octopus Blog

Are 2FA and MFA an Answer to Password Fatigue?

By Inbal Voitiz|September 15th, 2020|Categories: Articles|

"123456." That's the most popular password of 2020. Closely followed by "123456789." At this point, it's not even funny.  Passwords failed as an adequate protection method a long time ago. Credential dumps that expose millions of passwords each year, combined with the tendency to reuse passwords across multiple apps and services, are a recipe for disaster. And you really can't blame [...]

What is SAML and how is it being used?

By Inbal Voitiz|September 3rd, 2020|Categories: Articles|

What is SAML? Security Assertion Markup Language (SAML) is a computer protocol that allows users to reuse their authentication credentials to log into multiple applications, instead of setting up new accounts with new credentials for every application. SAML is not the only protocol that does this. OpenID Connect (ODIC), for example, is a very popular authentication protocol for consumer applications that [...]

Top 6 Password Attacks and How to Prevent Them

By Inbal Voitiz|August 27th, 2020|Categories: Articles|

Passwords are highly vulnerable and extremely valuable, and therefore a high-value target for attackers. There numerous attacks on passwords. Here's an overview of the main tactics: Social Engineering Social Engineering attacks misdirect users to malicious websites that impersonate legitimate ones and ask them for their passwords (and possibly other credentials like one-time passcode, etc.). Once users enter their passwords on a [...]

Gartner’s 2020 “Market Guide for User Authentication” Report

By Secret Double Octopus Staff|July 12th, 2020|Categories: In the News|

Secret Double Octopus is proud to be included in Gartner’s “Market Guide for User Authentication” report for the 3rd time As one of the world’s most renowned research companies, Gartner regularly examines the user authentication landscape and reports important industry trends, technological innovations and emerging market needs. This year’s report contains several interesting findings such as the growing demand for a [...]

3 Pillars of Digital Transformation: Cost, Usability, and Security

By Shimrit Tzur-David|June 30th, 2020|Categories: Articles|Tags: , , , , , , |

Digital transformation is nothing new. Enterprises have been striving to achieve digital El Dorado for over a decade now, looking to solve usability and security issues and improve the quality of work and service. Yet, the progress has been slow, to say the least. It’s not that companies do not understand the value. It has been widely accepted that digital transformation is THE thing to strive for. After all, digital-first [...]

How to handle passwords under GDPR

By Inbal Voitiz|June 22nd, 2020|Categories: Articles|Tags: , , , , , , |

Two key regulations that have impacted the security and privacy landscape are the European Unions General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Although both legislations are applicable to their own jurisdictions, they have considerable impact on how companies around the globe operate. We live in a globalized online economy, where your business can have customers across the world, and you should be careful not to run afoul of any of these regulatory measures, and others [...]

Put a PIN in that: why passwords vs. PINs comparisons are irrelevant

By Inbal Voitiz|June 9th, 2020|Categories: Articles|Tags: , , , , , , |

Your IT: "Your account is now secured with a PIN, adding an extra layer of security to your account." Your Users: "Great idea! I'll just use my credit card PIN, and now I will always remember my computer PIN too!"  Many security managers have struggled with similar exchanges in recent years, as the business world continuously examines added security layers for  employees and users [...]

x

Get in Touch

x

Get in Touch With Sales