mm

About Samuel Siskind

Samuel studied intelligence research at the American Military University in West Virginia. Upon completing his studies he served in the IDF Corp of Combat Engineering Intelligence Wing in addition other roles in the Corps' units. Today he works as a researcher on global security threats in the fields of technology and cyber.
  • Federated Identity vs SSO |Secret Double Octopus

Federated Identity Vs SSO

For today’s enterprise, maintaining an arsenal of effective network tools is all about access. Organizations need to provide access to a slew of online programs and applications to the right people in order to streamline operations. To accomplish this, organizations utilize methods to maximize the use of digital identities for multiple users. Single Sign On (SSO) and its varient called Federated [...]

  • gdpr and authentication | Secret Double Octopus

How GDPR Will Change the Face of Digital Authentication

The highly anticipated General Data Protection Regulations of the European Union (GDPR) will come into effect in a few short months. The laws of GDPR represent a total paradigm shift in IT regulation. While other national and international legislation has focused on laying down specific rules for interacting with digital data, GDPR goes one step further by changing the relationship between [...]

  • MFA mobile | Secret Double Octopus

Finding the Best Mobile Authentication Solution for your Enterprise

In the rapidly growing industry of advanced authentication, mobile solutions play a central role. Mobile apps for authentication have growing in popularity for quite some time. Researchers at Gartner predicted in 2017 that the majority of users would implement some form of mobile authentication in the coming years. Two important factors are driving this trend. First is from the security angle. [...]

  • Password vulnerabilities - secret double octopus

What you need to know about password vulnerabilities (Pt. 2)

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

  • Identity Security

Taking on the Growing Threat to Identity Security

The need for a robust identity security and access management (IAM) strategy is one of the central concerns of securing enterprise IT. Strong identity solutions can help firms boost their productivity by streamlining user access in additional to strengthening the overall security of the organization. But with identity theft steadily on the rise in recent years, resulting in billions in losses [...]

  • Multi factor authentication with office 365

Multi factor authentication with office 365

Office 365 is one of the most popular sets of subscription suites for productivity software used at the corporate level. The compatibility to a wide spectrum of operating systems and the variety of programs available on Office, make it an obvious choices for many medium size to large businesses. Weak Links in the Chain Office comes with its vulnerabilities however. The [...]

Survey Maps User Preferences of Leading Authentication Tools

For the full report go to: https://doubleoctopus.com/facing-a-future-without-passwords/ In with the new, out with the old This pretty much sums up the dominating trends in authentication methods over the past several years. With many traditional methods depreciated, more and more replacement technologies have been making an entrance into the market. The question for businesses is which particular method will be the most adequate [...]

What is Federated Identity Management and how to secure it

Federated identity management (FIM) is an arrangement that can be made among multiple enterprises that let subscribers use the same identification data to obtain access to an application, program, and even the networks of all members of the group. Identity federation offers economic advantages, as well as logistical ones, to enterprises and their network subscribers. Anyone who has had the experience [...]