Blog

Your go-to source for the latest Secret Double Octopus digital.

Access Management and MFA

How two-factor authentication hardens the security of digital signatures

Learn More
Nov 23, 2017

Access Management and MFA

Customer Authentication Solutions 2017- The Challenge

Learn More
Nov 15, 2017

Access Management and MFA

The Case for Securing Remote Access Protocols Through 2FA

Learn More
Nov 7, 2017

Access Management and MFA

Survey Maps User Preferences of Leading Authentication Tools

Learn More
Oct 31, 2017

Access Management and MFA

What you need to know on two-factor authentication for your Linux machine

Learn More
Oct 24, 2017

Access Management and MFA

What is Federated Identity Management and how to secure it

Learn More
Oct 17, 2017

Access Management and MFA

What you need to know about the security and privacy of face recognition logins

Learn More
Oct 2, 2017

Access Management and MFA

What’s the Difference Between Authentication and Authorization?

Learn More
Sep 19, 2017

Access Management and MFA

2017 Phone as an Authenticator; Methods, Benefits and Risks

Learn More
May 3, 2017