The Octopus Blog

Small business security: to MSSP or not to MSSP?

By Orf|November 17th, 2020|Categories: Articles|

For most of human history, small business owners had to worry about one thing and one thing only: establishing and growing the business. Today, it is no longer the case.  Digital transformation has changed everything, including the world of cybercrime.   Attacks on large organizations and government entities may dominate the news, but small businesses are more vulnerable to an attack. Less [...]

Authentication vs. Authorization – What is the Difference Exactly?

By Inbal Voitiz|November 5th, 2020|Categories: Articles|

The distinction between authentication and authorization is many times missed or confused. Some of the confusion has to do with the fact that the short form for authentication and authorization is the same - “auth” - so a delegated authorization scheme like OAUTH can be easily confused with something that has to do with authentication. But authentication and authorization are really [...]

Single Sign-On – How Does it Work and What is Passwordless SSO?

By Shimrit Tzur-David|October 19th, 2020|Categories: Articles|

An enterprise's most significant cybersecurity weakness is something employees do at their workstations every day, often multiple times — enter a password. According to Verizon, weak, reused, or leaked passwords may be behind 80% of data breaches.  One of the first steps enterprises can take to reduce the use of passwords is to implement SSO for their employees’ cloud and web-based [...]

Standard Chartered Bank’s Investment Unit Invests in Secret Double Octopus

By Secret Double Octopus Staff|October 18th, 2020|Categories: Press Release|Tags: |

The strategic investment by SC Ventures will help Secret Double Octopus meet the rapidly growing demand for its passwordless authentication solution Secret Double Octopus, the leader in Enterprise Passwordless Authentication, announced today that it secured a strategic investment from SC Ventures, the innovation, fintech investment and ventures arm of international banking group, Standard Chartered. SC Ventures joins a distinguished list of [...]

Active Directory & Passwordless Authentication

By Raz Rafaeli|October 1st, 2020|Categories: Articles|

Since its release in 1999, Microsoft Active Directory has gradually developed into the technology of choice for managing the digital infrastructure of businesses of various sizes. Active Directory can scale as organizations grow from small to large, from a single building to dozens of geographical locations, from a single server to several large data centers scattered across the world, and from a [...]

Secret Double Octopus Appoints Farzad Tari as EVP Business Development

By Secret Double Octopus Staff|September 29th, 2020|Categories: Press Release|Tags: |

Tari joins the passwordless authentication company's US headquarters to boost its strategic partnerships in the IAM market and strengthen joint offerings with global industry leaders Secret Double Octopus, the global pioneer in Enterprise-Ready Passwordless Authentication, announced today the appointment of Farzad Tari as Executive Vice President of Business Development. In his new role, Tari will manage Secret Double Octopus's global distribution channels, technology [...]

Are 2FA and MFA an Answer to Password Fatigue?

By Inbal Voitiz|September 15th, 2020|Categories: Articles|

"123456." That's the most popular password of 2020. Closely followed by "123456789." At this point, it's not even funny.  Passwords failed as an adequate protection method a long time ago. Credential dumps that expose millions of passwords each year, combined with the tendency to reuse passwords across multiple apps and services, are a recipe for disaster. And you really can't blame [...]

What is SAML and how is it being used?

By Inbal Voitiz|September 3rd, 2020|Categories: Articles|

What is SAML? Security Assertion Markup Language (SAML) is a computer protocol that allows users to reuse their authentication credentials to log into multiple applications, instead of setting up new accounts with new credentials for every application. SAML is not the only protocol that does this. OpenID Connect (ODIC), for example, is a very popular authentication protocol for consumer applications that [...]

Top 6 Password Attacks and How to Prevent Them

By Inbal Voitiz|August 27th, 2020|Categories: Articles|

Passwords are highly vulnerable and extremely valuable, and therefore a high-value target for attackers. There numerous attacks on passwords. Here's an overview of the main tactics: Social Engineering Social Engineering attacks misdirect users to malicious websites that impersonate legitimate ones and ask them for their passwords (and possibly other credentials like one-time passcode, etc.). Once users enter their passwords on a [...]

x

Get in Touch

x

Get in Touch With Sales