Read up on all the latest best practices on authentication on the Octopusblog including the latest on alternative authentication methods such as no-password logins. Also learn how weaknesses in authentication lead to some of the biggest recent cyber attacks such as the Equifax breach.

Password- Based Authentication: Vulnerabilities And Alternative Solutions

The password has been the staple of authentication for years. While passwords are still very much a part of our information technology landscape, they have been on the decline for more than a decade. “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just don’t meet the challenge for anything [...]

Practice What you Preach – IT’s Achilles Heel

Thus goes the old adage. Of all the fields we would expect the ‘experts’ to follow their own rules, data security would probably be it. With a growing list of high profile hacks caused by poor security practices, infosec professionals are well aware what’s at risk from being careless in this area. Unfortunately, the data suggests that even the pros are [...]

By |September 17th, 2018|Categories: Articles|Tags: , |

Passwordless Authentication Frequently Asked Questions (Part 2)

As more and more people become aware of the vulnerabilities of passwords, there’s an increasing interest in deploying passwordless authentication in the networks and services of organizations and businesses. However, one of the problems that most organizations face is that the software they use has been designed to work with passwords with default. In the past months, we’ve received plenty of [...]

The Rise of the e-State – A Story About Estonia

We are approaching a future where our physical identity and digital identity will merge. Today, our biological traits, behavioral markers, and other characteristics are used to identify us in the digital sphere, affecting more and more aspects of our daily lives. The numbers on this shift in identity authentication are pretty clear. In a recent IBM study surveying citizens from the North American, [...]

Federated Identity Vs SSO

For today’s enterprise, maintaining an arsenal of effective network tools is all about access. Organizations need to provide access to a slew of online programs and applications to the right people in order to streamline operations. To accomplish this, organizations utilize methods to maximize the use of digital identities for multiple users. Single Sign On (SSO) and its varient called Federated [...]

Equifax data breach is latest reminder of security lessons

Published in The Hill on September 8, 2017 by Raz Rafaeli The Equifax data breach this week has quickly become recognized as the quite possibly the worst breach in history. Although other hacks dwarf the Equifax incident in sheer size and volume, the Equifax breach is particularly severe due to the breathtaking amount of highly sensitive data it has left open to criminals. The [...]

The Equifax Breach: How it Went Down

Weeks after the cover was blown about the Equifax breach, the incident has become established as one of the biggest and most detrimental attacks on online consumers ever. The actual volume of data exposed aside, what makes the Equifax hack so bad is not only the highly sensitive nature of the information, but that recovery and mitigation of the damage is [...]

What’s the Difference Between Authentication and Authorization?

In order to protect sensitive data and operations from unwanted access by intruders and malicious actors, developers integrated authentication and authorization features into their applications. Whether you’re running a banking app, a social media website or a blogging platform, these are the two key functionalities that will seal your application against security incidents. While the two terms are often used interchangeably, [...]

Tech Data Europe Announces New Distribution Agreement with Secret Double Octopus

Tech Data Europe announced today a pan-EMEA distribution agreement with  Secret Double Octopus, a pioneer of keyless multi-shield authentication technology.   Secret Double Octopus has developed a solution for the market that applies keyless authentication and identity protection for cloud, mobile, and IoT solutions.

Authentication Trends – Getting Beyond First Based Identification

Published on SC Media on May 23 2017, by Raz Rafaeli Passwords will start to pass away: For years, security experts have slammed passwords, and in its annual prediction of trends, KPMG has declared 2017 the year that passwords finally start to go away. As the reports makes clear: “The security and the business community are starting to realize that they need a [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search