Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus blog

To MSSP or not to MSSP?

Blog

Thursday November 12, 2020

Small business security: to MSSP or not to MSSP?

For most of human history, small business owners had to worry about one thing and one thing only: establishing and growing the business. Today, it is no longer the case.  Digital transformation has changed everything, including the world of cybercrime.   Attacks on large organizations and government entities may dominate the news, but small businesses are...
Read more

About Us

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Authentication vs. Authorization

Blog

Thursday November 5, 2020

Authentication vs. Authorization – What is the Difference Exactly?

The distinction between authentication and authorization is many times missed or confused. Some of the confusion has to do with the fact that the short form for authentication and authorization is the same – “auth” – so a delegated authorization scheme like OAUTH can be easily confused with something that has to do with authentication....
Read more

How Does SSO Work?

Blog

Monday October 19, 2020

Single Sign-On – How Does it Work and What is Passwordless SSO?

An enterprise’s most significant cybersecurity weakness is something employees do at their workstations every day, often multiple times — enter a password. According to Verizon, weak, reused, or leaked passwords may be behind 80% of data breaches.  One of the first steps enterprises can take to reduce the use of passwords is to implement SSO...
Read more

Active Directory & Passwordless

Blog

Thursday October 1, 2020

Active Directory & Passwordless Authentication

Since its release in 1999, Microsoft Active Directory has gradually developed into the technology of choice for managing the digital infrastructure of businesses of various sizes. Active Directory can scale as organizations grow from small to large, from a single building to dozens of geographical locations, from a single server to several large data centers scattered...
Read more

Are 2FA and MFA the Answer?

Blog

Tuesday September 15, 2020

Are 2FA and MFA an Answer to Password Fatigue?

“123456.” That’s the most popular password of 2020. Closely followed by “123456789.” At this point, it’s not even funny.  Passwords failed as an adequate protection method a long time ago. Credential dumps that expose millions of passwords each year, combined with the tendency to reuse passwords across multiple apps and services, are a recipe for...
Read more

What is SAML and how it's used?

Blog

Thursday September 3, 2020

What is SAML and how is it being used?

What is SAML? Security Assertion Markup Language (SAML) is a computer protocol that allows users to reuse their authentication credentials to log into multiple applications, instead of setting up new accounts with new credentials for every application. SAML is not the only protocol that does this. OpenID Connect (ODIC), for example, is a very popular...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

Top 6 Password Attacks

Blog

Thursday August 27, 2020

Top 6 Password Attacks and How to Prevent Them

Passwords are highly vulnerable and extremely valuable, and therefore a high-value target for attackers. There are numerous attacks on passwords. Here’s an overview of the main tactics: Social Engineering Social Engineering attacks misdirect users to malicious websites that impersonate legitimate ones and ask them for their passwords (and possibly other credentials like one-time passcode, etc.)....
Read more