Read up on the latest cybersecurity regulations like GDPR, NYDFS, and a close look at the SWIFT authentication practices.

  • gdpr and authentication | Secret Double Octopus

How GDPR Will Change the Face of Digital Authentication

The highly anticipated General Data Protection Regulations of the European Union (GDPR) will come into effect in a few short months. The laws of GDPR represent a total paradigm shift in IT regulation. While other national and international legislation has focused on laying down specific rules for interacting with digital data, GDPR goes one step further by changing the relationship between [...]

  • Equifax breach

Equifax data breach is latest reminder of security lessons

Published in The Hill on September 8, 2017 by Raz Rafaeli The Equifax data breach this week has quickly become recognized as the quite possibly the worst breach in history. Although other hacks dwarf the Equifax incident in sheer size and volume, the Equifax breach is particularly severe due to the breathtaking amount of highly sensitive data it has left open to criminals. The [...]

The Equifax Breach: How it Went Down

Weeks after the cover was blown about the Equifax breach, the incident has become established as one of the biggest and most detrimental attacks on online consumers ever. The actual volume of data exposed aside, what makes the Equifax hack so bad is not only the highly sensitive nature of the information, but that recovery and mitigation of the damage is [...]

  • multi factor authentication

A Close Look at SWIFT’s Wire Transfer Authentication Practices

Published on International Banker by June 20, 2017, by Raz Rafaeli  In February 2016, hackers heisted $81 million from the Bangladesh Bank, cleverly stealing the money via the transfer system of the Society for Worldwide Interbank Financial Telecommunication, commonly referred to as SWIFT. Via a series of subterfuges and with the right timing (scheduling the thefts for a weekend, when staff [...]

  • Applying Military Protocol to Cybersecurity Best Practices

Applying Military Protocol to Cybersecurity Best Practices

Posted on info security magazine, April 7, 2017 by Raz Rafaeli Relying on a single measure of security – whether it's to launch nuclear missiles or to protect IT infrastructure – is dangerous, which is why the military long ago instituted the ‘two person rule’, to prevent accidental or malicious launch of nuclear weapons The world came this close to nuclear annihilation [...]

  • Cyber Security NY regulations

NY state cybersecurity regs go into effect today, industry responds

Posted on CS Magazin, March 01, 2017 by Greg Masters, Managing Editor "While we have historically seen slow adoption of two-factor authentication – mostly due to poor UX design – this regulation comes at a time when next-generation authentication platforms have the right combination of frictionless user experience and none of the security resiliency problems we saw in the past."  Raz Rafaeli, CEO of Secret Double Octopus Responding to growing threats from [...]