Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.
General
General KDDI Digital Security Inc. Offers Complete Passwordless MFA Service to Enterprises KDDI Digital Security Inc. Offers Complete Passwordless MFA Service to Enterprises
Threats and Attacks
Threats and Attacks How to Stop Hackers from Bypassing 2FA How to Stop Hackers from Bypassing 2FA
Standards and Regulations
Standards and Regulations FIDO Authentication Guide: FIDO, Passkey, WebAuthn & Implementation Best Practices FIDO Authentication Guide: FIDO, Passkey, WebAuthn & Implementation Best Practices
General
General Hot Cloud Failover to On-prem Authentication: An Octopus-only Innovation Hot Cloud Failover to On-prem Authentication: An Octopus-only Innovation
Standards and Regulations
Standards and Regulations MFA Can’t Fulfill the Promise of Zero Trust— but Passwordless MFA Can MFA Can’t Fulfill the Promise of Zero Trust— but Passwordless MFA Can
Passwordless MFA
Passwordless MFA You Rolled Out MFA and Still Got Phished – Now What? You Rolled Out MFA and Still Got Phished – Now What?
Access Management and MFA
Access Management and MFA AuthZ vs AuthN – What is the Difference Exactly? AuthZ vs AuthN – What is the Difference Exactly?
Access Management and MFA
Access Management and MFA Can MFA Secure Remote Access to Critical Infrastructure? Can MFA Secure Remote Access to Critical Infrastructure?
Threats and Attacks
Threats and Attacks Phishing 2024: Vishing, Smishing and Quishing – AI!  Phishing 2024: Vishing, Smishing and Quishing – AI!