mm

About Amit Rahav

Seasoned with 25 years of experience in larger corporations and startups alike, in sales, marketing, customer care and product management, Amit is tasked with the business development, customer success, and marketing operations at Secret Double Octopus. Amongst Amit’s favorite activities is underwater scuba diving, with a particular fascination for octopuses.
  • Identity and access management - secret double octopus

What to Look for in Identity and Access Management Solutions?

Effective identity and access management platform? System? is likely the single most important responsibility for today’s chief information security officers (CiSO). Information and Access Management, or IAM, is the bread and butter of securing a network, ensuring access to data and applications is controlled and uncompromising. IAM plays a vital role in a company’s overall security framework. Having an effective strategy [...]

By |June 11th, 2018|Categories: Articles|
  • Hardware tokens Vs Software Tokens - secret double octopus

Why Are Software Tokens a Better Option

Tokens form an important part of the authentication process. In our previous post, we looked at how tokens fit into this process, and the different types of tokens available. In this piece, we’ll take a closer look at hardware tokens versus software tokens, and take a glimpse into the future of which token is likely to be the most widely adopted [...]

By |June 5th, 2018|Categories: Articles|Tags: , |
  • Tokens Hard, Soft And What’s In Between - Secret Double Octopus

Tokens – Hard, Soft And What’s In Between

Proving your identity in order to authenticate yourself and gain access to some kind of system, is more of a challenge than most people realize. This process has to be designed so that on one hand it’s as easy as possible for the user of the system to gain access, while on the other it’s as difficult as possible for someone [...]

  • Active directory and LDAP - Secret double octopus

LDAP, Active Directory and Federated Identity: What You Need to Know

Managing identities across an enterprise is one of the bigger challenges facing the world of digital security. In a company where large numbers of users access multiple applications in a diverse work environment, managers need reliable tools that allow smooth access for workers, while maintaining strong authentication standards.   Making Some Order When looking at the most common tools used in [...]

By |May 14th, 2018|Categories: Articles|Tags: , |
  • NY-DFS-Cyber-Regulations-Double-Secret-Octopus

Digital Authentication in the Age of NY’s DFS Cyber Regulations

Amongst the wide range of data legislation being cranked out by governments over the past several years, the New York State Department of Financial Security’s (NYS DFS) cyber regulations are some of the most important and influential. As New York City is very much the “financial capital” of the globe, regulations codified by State authorities affect a large swath of the [...]

  • Man in the middle attacks - Secret double octopus

Blockchain Vulnerability to Man-in-the-middle Attacks

Early February this year, researchers found a Man-in-the-middle (MitM) vulnerability in the popular Ledger hardware crypto wallet application that allowed hackers to redirect victims’ funds to their own wallets by changing the destination address of cryptocurrency transactions. The news came as a disappointment to users who considered hardware wallets such as Ledger as the most secure way to store their digital [...]

  • chameleon - Adaptive authentication - Secret Double Octopus

Rethinking Adaptive Authentication

Adaptive Authentication is one of the fastest growing approaches in the field of multifactor authentication. Adaptive systems take advantage of contextual and behavioral aspects to assess the risk of an access attempt and adapt the type of authentication accordingly. For instance, let’s say an access request is emanating from an unusual location or at an unusual time, strong indicators of a [...]

  • 2018 the year of passwordless authentication | Secret Double Octopus

What Will Authentication Look Like in 2018

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

  • cost of multifactor authentication | Secret Double Octopus

What is the Total Cost of Deploying Multi Factor Authentication for your Business?

Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]

  • Password vulnerabilities - secret double octopus

What you need to know about password vulnerabilities (Pt. 1)

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]