Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus blog

Passwords vs. PINs

Blog

Tuesday June 9, 2020

Put a PIN in that: why passwords vs. PINs comparisons are irrelevant

Your IT: “Your account is now secured with a PIN, adding an extra layer of security to your account.” Your Users: “Great idea! I’ll just use my credit card PIN, and now I will always remember my computer PIN too!”  Many security managers have struggled with similar exchanges in recent years, as the business world continuously examines added...
Read more

About Us

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Secure Work in a Post-COVID World 

Blog

Monday May 25, 2020

Getting back to normal: secure work in a post-coronavirus world 

For the second time in a few short months, we are entering uncharted territory. After having to adjust to unprecedented lockdowns and near standstill of economic activity, now businesses worldwide are slowly, and with cautious optimism, getting back to some regular routine.   The truth is, no one knows what the new normal will look like. But one thing is clear – as organizations prepare to resume operations,...
Read more

Active Directory and Federated Identities

Blog

Wednesday May 20, 2020

LDAP, Active Directory and Federated Identity: What You Need to Know

Managing identities across an enterprise is one of the bigger challenges facing the world of digital security. In a company where large numbers of users access multiple applications in a diverse work environment, managers need reliable tools that allow smooth access for workers, while maintaining strong authentication standards. Making Some Order When looking at the...
Read more

2FA VS Passwordless

Blog

Tuesday May 12, 2020

2FA VS Passwordless Authentication – Equal Enterprise Security?

Enterprise security is a fight to the death. It’s rough out there! Passwords are ridiculously easy to guess, and the ones that aren’t are almost as easily stolen. Just look at the countless high profile server breaches that leaked millions of end-user passwords over the years. It’s banks and businesses, not just consumers, that end up paying when hackers...
Read more

Passwordless for Supply Chain attacks

Blog

Monday April 27, 2020

Supply Chain attacks: mitigating hidden risks with Passwordless Authentication

In today’s globalized world where efficiency and speed are paramount, no organization is an island. Inevitably, we all must place trust into vendors, third-party services, and software providers to keep the business going.  As a direct consequence of the global move towards distributed enterprise, hackers are increasingly utilizing blind spots in supply chains to target...
Read more

Universities' Cyber Security

Blog

Monday April 13, 2020

Universities and Cyber Security: A Lesson From Iranian Hackers

Well before the COVID-19 pandemic, the headlines were dominated once again by the notion of state-sponsored cyberwarfare. Due to the surge in tensions between Iran and the U.S., and in the wake of the strike that killed top Iranian commander Qassem Soleimani, the Department of Homeland Security issued a warning of a potential retaliatory cyberattack...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

The Future of Corporate VPN

Blog

Tuesday March 31, 2020

The Future of Corporate VPN

As countries engage in and extend lockdowns and quarantines due to the coronavirus pandemic, companies, organizations, and government agencies are learning to cope with the new work-from-home culture. One of the most important challenges that every organization faces is providing its employees with secure and stable access to their corporate applications and resources. In this...
Read more