The Octopus Blog

IT Pro Portal: Why password policies are a waste of time and money for companies?

By Secret Double Octopus Staff|August 19th, 2020|Categories: In the News|

Every year, billions of personal and corporate accounts are hacked. And every year, organizations respond in the same way: enforcing stricter password policies. The result? A false sense of accomplishment and a short-lived boost to security, followed by a return to the usual: insecure passwords and, of course, more compromised accounts. Keep reading...  

The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them

By Shimrit Tzur-David|August 8th, 2020|Categories: Articles|Tags: , , |

In the realm on protecting digital information, a man-in-the-middle (MITM) attack is one of the worst things that can happen to an individual or organization. MITM attacks happen when an unauthorized actor manages to intercept and decipher communications between two parties and monitors or manipulates the exchanged information for malicious purposes. And while the term has been a staple in cybersecurity [...]

DarkReading: Hot Startups to Watch @ BlackHat USA 2020

By Secret Double Octopus Staff|August 5th, 2020|Categories: In the News|

Secret Double Octopus is on a mission to replace the password with tools that enable easy multifactor authentication. Its Octopus Authenticator aims to provide a simple, passwordless login experience for workstations, domains, network, cloud, and legacy applications. Keep reading...

Gartner’s 2020 “Market Guide for User Authentication” Report

By Secret Double Octopus Staff|July 12th, 2020|Categories: In the News|

Secret Double Octopus is proud to be included in Gartner’s “Market Guide for User Authentication” report for the 3rd time As one of the world’s most renowned research companies, Gartner regularly examines the user authentication landscape and reports important industry trends, technological innovations and emerging market needs. This year’s report contains several interesting findings such as the growing demand for a [...]

Your Complete Guide to FIDO, FIDO2 and WebAuthn

By Shimrit Tzur-David|June 30th, 2020|Categories: Articles|Tags: , |

In the past years, advances in technology, a growing number of horrifying data breaches, and increasing awareness of the need to protect online personal and corporate accounts have led to growing efforts in creating multi-factor authentication (MFA) technologies. But while the dream of creating authentication mechanisms that don’t rely on just memorizing and typing passwords dates back to many years, never [...]

3 Pillars of Digital Transformation: Cost, Usability, and Security

By Shimrit Tzur-David|June 30th, 2020|Categories: Articles|Tags: , , , , , , |

Digital transformation is nothing new. Enterprises have been striving to achieve digital El Dorado for over a decade now, looking to solve usability and security issues and improve the quality of work and service. Yet, the progress has been slow, to say the least. It’s not that companies do not understand the value. It has been widely accepted that digital transformation is THE thing to strive for. After all, digital-first [...]

How to handle passwords under GDPR

By Inbal Voitiz|June 22nd, 2020|Categories: Articles|Tags: , , , , , , |

Two key regulations that have impacted the security and privacy landscape are the European Unions General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Although both legislations are applicable to their own jurisdictions, they have considerable impact on how companies around the globe operate. We live in a globalized online economy, where your business can have customers across the world, and you should be careful not to run afoul of any of these regulatory measures, and others [...]

x

Get in Touch

x

Get in Touch With Sales