Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.
Access Management and MFA
New Access Management and MFA AI and the Identity Security Debt: A New Challenge for IAM AI and the Identity Security Debt: A New Challenge for IAM
Standards and Regulations
New Standards and Regulations CMMC 2.0 and the Identity Imperative: What Defense Contractors Need to Know CMMC 2.0 and the Identity Imperative: What Defense Contractors Need to Know
Passwordless MFA
New Passwordless MFA Top MFA Blind Spots: Why “We Have MFA” Isn’t Enough Anymore Top MFA Blind Spots: Why “We Have MFA” Isn’t Enough Anymore
Threats and Attacks
Threats and Attacks The Stryker/Handala Wake-Up Call: Passwordless MFA Has to Cover the Entire Enterprise The Stryker/Handala Wake-Up Call: Passwordless MFA Has to Cover the Entire Enterprise
Standards and Regulations
Standards and Regulations The Financial-Services Authentication Reset: MFA, Phishing Resistance, and What Regulators Now Expect The Financial-Services Authentication Reset: MFA, Phishing Resistance, and What Regulators Now Expect
Passwordless MFA
Passwordless MFA Credit Unions and Small Banks Deserve Phishing-Resistant MFA Too Credit Unions and Small Banks Deserve Phishing-Resistant MFA Too
Threats and Attacks
Threats and Attacks When Legacy Is the Weakest Link: Lessons from the Oracle Breach When Legacy Is the Weakest Link: Lessons from the Oracle Breach
Passwordless MFA
Passwordless MFA A New Era of Simplicity and Security A New Era of Simplicity and Security
Passwordless MFA
Passwordless MFA Halfway Security Is No Security: When Windows Hello Leaves the Door Open Halfway Security Is No Security: When Windows Hello Leaves the Door Open
12314