The Octopus Blog

Authentication and government contracts: the password requirements of NIST and DFARS

By Raz Rafaeli|January 17th, 2021|Categories: Articles|

Government contracts can be very attractive for organizations of any size. A testament to the fact is the fierce competition between large tech companies to win the bid for the Department of Defense’s (DoD) JEDI project, worth over $10 billion. But public sector contracts have their own set of caveats and sensibilities, and not taking them into consideration can land an [...]

When it comes to passwords, even the tech giants mess up 

By Shimrit Tzur-David|January 7th, 2021|Categories: Articles|

We trust internet giants with some of our most sensitive information: personal and business communications, documents, financial transactions, social and dating profiles, medical information and the list grows with every new feature and service we're offered. But this incredible new level of trust in corporations comes with an often-overlooked dark side. In many cases, the only thing standing between evil hackers [...]

2020 in review: A year to remember

By Secret Double Octopus Staff|December 31st, 2020|Categories: Articles|

2020 has been a year to remember, that we can all agree on. The global effects brought to us by the COVID-19 pandemic registered significant changes we all experienced in our personal and professional life, including the unprecedented rise in work-from-home and an ever-growing dependency on the digital world. For the Cyber industry, the global changes have on the one hand [...]

Best of 2020: Our most-read blogs of the year

By Secret Double Octopus Staff|December 29th, 2020|Categories: Articles|

This year has been like no other, but our amazing staff stayed focused on securing your domain amid all the unexpected changes. And while COVID-19 and its effects on the workplace were hot topics in many circles, our readers mainly wanted interesting and useful guides to the world of passwordless. Here are the stars of 2020 in our blog:     [...]

ITProPortal: 2020 and the passwordless enterprise

By Secret Double Octopus Staff|December 29th, 2020|Categories: In the News|

From the security dynamics of remote work to continued security breaches and phishing campaigns, 2020 was an eccentric year highlighting the skyrocketing need for better identity and authentication solutions in the business sector more than ever. As we take a look back at a year rife with a threat landscape for enterprise companies, it’s prime time to examine the advances in [...]

SC Magazine: How to avoid the post-holiday help-desk backlog

By Secret Double Octopus Staff|December 23rd, 2020|Categories: In the News|

It’s always difficult for employees to settle back into work after the holiday season – and that especially holds true for IT professionals. As employees return to work after the holidays, they inevitably subject help desks with a barrage of new support tickets, while simultaneously opening up potential cybersecurity weaknesses. In 2021, companies will also have to deal with the lingering [...]

Secret Double Octopus Bolsters Remote Work Security with Citrix®

By Secret Double Octopus Staff|December 21st, 2020|Categories: Press Release|Tags: |

Company to provide enterprise users of Citrix Virtual Apps and Desktops™ with passwordless authentication to deliver a simpler and safer login experience Secret Double Octopus, the leader in passwordless authentication for the enterprise, today announced that it will deliver passwordless authentication capabilities to enterprise users of Citrix Virtual Apps and Desktops, enabling a more secure and user-friendly authentication experience. As a [...]

5G Networks and the Future of Authentication

By Shimrit Tzur-David|December 17th, 2020|Categories: Articles|

One of the most promising technological advances of the decade is the debut of the fifth generation of mobile networks, 5G. The huge promise of 5G is due to its ability to provide ubiquitous internet coverage at ultra-speeds (~20 Gbps), with high capacity and very low latency.   The advent of 5G will pave the way for new applications in many different domains, including the internet of things (IoT), [...]

DarkReading: Corporate Credentials for Sale on the Dark Web

By Secret Double Octopus Staff|December 17th, 2020|Categories: In the News|

It's past time to retire passwords in favor of other methods for authenticating users and securing systems. Despite how valuable corporate employees' passwords are and the best efforts of companies to protect their systems, user credentials keep ending up for sale on Dark Web forums. Even with the ever-advancing capabilities of the cybersecurity industry, corporate credentials from all industries appear in [...]

Where should CISOs put their money in 2021?

By Inbal Voitiz|December 3rd, 2020|Categories: Articles|

CISOs undeniably faced a new hosting of challenges across the board this year due to the global pandemic. As we approach the end of the year, not only is it a good time to reflect on the past year but prepare for what the foreseeable future holds for enterprise cybersecurity. As enterprises continue to adjust transition to the reality of remote [...]

Emotet is back, and it’s after your passwords!

By Shimrit Tzur-David|November 22nd, 2020|Categories: Articles|

Just when we thought 2020 couldn’t get any worse, the U.S. Department of Homeland Security (DHS) declared that Emotet, a strain of malware (and a cybercrime operation allegedly directed by Russian hackers) that has existed since 2014, has seen a resurgence of activity. DHS describes Emotet as “one of the most prevalent ongoing threats” that is targeting various organizations, especially “state [...]

Small business security: to MSSP or not to MSSP?

By Or Finkelstein|November 12th, 2020|Categories: Articles|

For most of human history, small business owners had to worry about one thing and one thing only: establishing and growing the business. Today, it is no longer the case.  Digital transformation has changed everything, including the world of cybercrime.   Attacks on large organizations and government entities may dominate the news, but small businesses are more vulnerable to an attack. Less [...]

Authentication vs. Authorization – What is the Difference Exactly?

By Inbal Voitiz|November 5th, 2020|Categories: Articles|

The distinction between authentication and authorization is many times missed or confused. Some of the confusion has to do with the fact that the short form for authentication and authorization is the same - “auth” - so a delegated authorization scheme like OAUTH can be easily confused with something that has to do with authentication. But authentication and authorization are really [...]

x

Get in Touch

x

Get in Touch With Sales