Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.
Standards and Regulations
Standards and Regulations @@---no Print--Congressional crackdown on data protection law has begun Congressional crackdown on data protection law has begun
Access Management and MFA
Access Management and MFA @@---no Print--Face Recognition Logins: Security and Privacy Face Recognition Logins: Security and Privacy
Threats and Attacks
Threats and Attacks @@---no Print--The Equifax Breach: How it Went Down The Equifax Breach: How it Went Down
Standards and Regulations
Standards and Regulations @@---no Print--The NIST guidelines and what they mean for the future of SMS authentication The NIST guidelines and what they mean for the future of SMS authentication
Threats and Attacks
Threats and Attacks SS7 – Yet Another Achilles Heal for SMS Authentication SS7 – Yet Another Achilles Heal for SMS Authentication
Standards and Regulations
Standards and Regulations @@---no Print--What you need to know about the General Data Protection Regulations What you need to know about the General Data Protection Regulations
Passwordless MFA
Passwordless MFA No-Password Login: Frictionless, Secure Alternatives No-Password Login: Frictionless, Secure Alternatives
General
General @@---no Print--The Case for the Secret Sharing Scheme The Case for the Secret Sharing Scheme
Access Management and MFA
Access Management and MFA @@---no Print--2017 Phone as an Authenticator; Methods, Benefits and Risks 2017 Phone as an Authenticator; Methods, Benefits and Risks
1202122