Multi Factor Authentication

Read all about the best Multi Factor Authentication methods on the Octopusblog. Learn about the difference between authentication factors and there pros and cons.

Reddit – Where CISO’s Go to Get Hacked

By Shimrit Tzur-David|August 14th, 2018|Categories: Articles|Tags: , , |

Yet another major enterprise has fallen victim to insecure identity protocols. The social network giant Reddit reported earlier this month that hackers had succeeded in breaching the company’s databases, exposing both usernames and passwords. Although cybercriminals were not able to alter any of Reddit’s information or source code, the companies Chief Technology Officer Christopher Slowe, admitted the hack was a serious [...]

Before you Get a Physical Security Token – What you Need to Know

By Shimrit Tzur-David|August 2nd, 2018|Categories: Articles|Tags: , , , , |

Last week Google announced that it will create its own physical universal second-factor authenticator that leverages the FIDO Alliance (Fast Identity Online). FIDO was designed to put an end to the tradeoff between fast, easy access on the one hand, and robust authentication security on the other. With the authentication scheme growing in popularity, several tech manufacturers like Yubico and Feitian [...]

Windows Hello for Business – Review

By Amit Rahav|July 19th, 2018|Categories: Articles|Tags: , , , |

Just a few years ago, biometric logins were the stuff of science fiction and technophiles. Today, the market has produced a slew of tools that have made biometrics available for the common user. Microsoft’s biometric solution, Windows Hello for Business (WHB), is one of the industries most successful platforms designed for enterprise-wide use. Let’s start with the basics: What Does it [...]

How Does Passwordless Authentication Work? (Part 1)

By Amit Rahav|July 9th, 2018|Categories: Articles|Tags: , , |

Being in the industry of authentication, we get quite a lot of questions on the topic, especially on how to get rid of passwords while maintaining a high level of assurance. To make access to this information a bit easier, we decided to put out a blog series with answers to the most commonly asked questions. Here’s the rundown of ongoing [...]

Why Passwordless Authentication is Essential for VPN’s

By Shimrit Tzur-David|June 13th, 2018|Categories: Articles|Tags: , , |

As the modern workforce becomes increasingly more mobile, businesses are allocating more and more on resources to secure remote connections. For years, Virtual Private Networks, or VPNs, have been the standard bearer for remote access. VPNs allow users to transfer sensitive data across a public network as if their devices were directly connected to private one. The New Paradigm Unfortunately, the [...]

What to Look for in Identity and Access Management Solutions?

By Amit Rahav|June 11th, 2018|Categories: Articles|Tags: , , |

Effective identity and access management platform is likely the single most important responsibility for today’s chief information security officers (CiSO). Information and Access Management, or IAM, is the bread and butter of securing a network, ensuring access to data and applications is controlled and uncompromising. IAM plays a vital role in a company’s overall security framework. Having an effective strategy enables [...]

Why Are Software Tokens a Better Option

By Amit Rahav|June 5th, 2018|Categories: Articles|Tags: , |

Tokens form an important part of the authentication process. In our previous post, we looked at how tokens fit into this process, and the different types of tokens available. In this piece, we’ll take a closer look at hardware tokens versus software tokens, and take a glimpse into the future of which token is likely to be the most widely adopted [...]

Software Tokens Vs Hardware Tokens

By Amit Rahav|May 28th, 2018|Categories: Articles|Tags: , , , |

Proving your identity in order to authenticate yourself and gain access to some kind of system is more of a challenge than most people realize. This process has to be designed so that on one hand it’s as easy as possible for the user of the system to gain access, while on the other it’s as difficult as possible for someone [...]

Tackling the PCI’s New Authentication Regulations

By Shimrit Tzur-David|May 7th, 2018|Categories: Articles|Tags: , |

The latest standards governing the world of digital payments have come into effect. On 1 February 2018, the new Data Security Standards of the Payment Card Industry’s (PCI) Council, or PCI DSS, came into effect. These new standards upgraded many protocols that used to be merely “best practices”, to full requirements. The updated PCI DSS is a significant shift from earlier [...]

Blockchain Vulnerability to Man-in-the-middle Attacks

By Amit Rahav|April 11th, 2018|Categories: Articles|Tags: , |

Early February this year, researchers found a Man-in-the-middle (MITM) vulnerability in the popular Ledger hardware crypto wallet application that allowed hackers to redirect victims’ funds to their own wallets by changing the destination address of cryptocurrency transactions. The news came as a disappointment to users who considered hardware wallets such as Ledger as the most secure way to store their digital [...]

What Will Authentication Look Like in 2018

By Amit Rahav|March 6th, 2018|Categories: Articles|Tags: , |

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

Finding the Best Mobile Authentication Solution for your Enterprise

By Amit Rahav|February 21st, 2018|Categories: Articles|Tags: , , |

In the rapidly growing industry of advanced authentication, mobile solutions play a central role. Mobile apps for authentication have growing in popularity for quite some time. Researchers at Gartner predicted in 2017 that the majority of users would implement some form of mobile authentication in the coming years. Two important factors are driving this trend. First is from the security angle. [...]

What is the Total Cost of Deploying Multi Factor Authentication for your Business?

By Amit Rahav|February 14th, 2018|Categories: Articles|Tags: , , |

Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]

x

Get in Touch

x

Get in Touch With Sales