Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.
General
General 5G Networks and the Future of Authentication 5G Networks and the Future of Authentication
General
General Small business security: to MSSP or not to MSSP? Small business security: to MSSP or not to MSSP?
Access Management and MFA
Access Management and MFA Single Sign-On – How Does it Work and What is Passwordless SSO? Single Sign-On – How Does it Work and What is Passwordless SSO?
Standards and Regulations
Standards and Regulations What is SAML and how is it being used? What is SAML and how is it being used?
Threats and Attacks
Threats and Attacks Top 6 Password Attacks and How to Prevent Them Top 6 Password Attacks and How to Prevent Them
Threats and Attacks
Threats and Attacks The Ultimate Guide to Man in the Middle (MITM) Attacks The Ultimate Guide to Man in the Middle (MITM) Attacks
Threats and Attacks
Threats and Attacks Fight Insider Threats with Passwordless Authentication  Fight Insider Threats with Passwordless Authentication 
Passwords
Passwords How to handle passwords under GDPR How to handle passwords under GDPR
Passwords
Passwords Put a PIN in that: why passwords vs. PINs comparisons are irrelevant Put a PIN in that: why passwords vs. PINs comparisons are irrelevant