Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus blog

Protecting Healthcare Professionals

Blog

Monday August 10, 2020

Protecting Health Professionals and Medical Infrastructure

Medical professionals are working in high-stress environments where human lives are at stake on a daily basis. High-paced and often unpredictable working conditions mean that data security is often the last thing on the mind of medical personnel. And that is the way it should be. Doctors, nurses, and administrative staff should be 100% focused...
Read more

About Us

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Preventing Man in the Middle Attacks

Blog

Saturday August 8, 2020

The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them

In the realm on protecting digital information, a man-in-the-middle (MITM) attack is one of the worst things that can happen to an individual or organization. MITM attacks happen when an unauthorized actor manages to intercept and decipher communications between two parties and monitors or manipulates the exchanged information for malicious purposes. And while the term...
Read more

Securing Remote Access Users

Blog

Tuesday July 28, 2020

Securing Remote Access Users

COVID19 is driving a spike in phishing attacks that exploit the uncertainty and anxiety brought on by these truly unprecedented times. With unemployment rates skyrocketing and many companies furloughing their employees, attackers are taking advantage of financial and career fears. State-backed hackers are also on a rampage, attacking pharmaceutical companies and research institutions working on treatments...
Read more

Fight Insider Threats with Passwordless

Blog

Monday July 20, 2020

Fight Insider Threats with Passwordless Authentication 

What Is an Insider Threat?  Formally speaking, an insider threat is any vulnerability, exploit, or potential means of attack created, intentionally or unintentionally, by legitimate users within the organization. These ‘insiders’ may be currently or formerly employed by the attacked organization, or outsiders contracted to perform services and given lawful access by the company. In the context of cybersecurity, insider threat usually relates to the use of privileged accounts in order to abuse resources, interfere with processes, or access sensitive data.  Needless to say,...
Read more

The Guide to FIDO and WebAuthn

Blog

Tuesday June 30, 2020

Your Complete Guide to FIDO, FIDO2 and WebAuthn

In the past years, advances in technology, a growing number of horrifying data breaches, and increasing awareness of the need to protect online personal and corporate accounts have led to growing efforts in creating multi-factor authentication (MFA) technologies. But while the dream of creating authentication mechanisms that don’t rely on just memorizing and typing passwords...
Read more

3 Pillars of Digital Transformation

Blog

Tuesday June 30, 2020

3 Pillars of Digital Transformation: Cost, Usability, and Security

Digital transformation is nothing new. Enterprises have been striving to achieve digital El Dorado for over a decade now, looking to solve usability and security issues and improve the quality of work and service. Yet, the progress has been slow, to say the least. It’s not that companies do not understand the value. It has been widely accepted that digital transformation...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

Handling Passwords Under GDPR

Blog

Monday June 22, 2020

How to handle passwords under GDPR

Two key regulations that have impacted the security and privacy landscape are the European Unions General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Although both legislations are applicable to their own jurisdictions, they have considerable impact on how companies around the globe operate. We live in a globalized online economy, where your business can have customers across the world, and you should be careful not to run afoul of...
Read more