Read all about the best Multi Factor Authentication methods on the Octopusblog. Learn about the best authentication techniques for different operating systems, the flaws of single-sign-on, and the most up-to-date technologies for multi-factor, such as SMS, and push notifications.

Congressional crackdown on data protection law has begun

By |October 9th, 2017|Categories: Articles|Tags: , , , |

Following a series of national level cyber incidents, federal lawmakers in the United States are beginning to take steps to clamp down on standards for data protection law as well as the big companies that make up the tech industry. One of the biggest wake up calls to Washington was the Equifax breach in mid-September, the hack that has come to [...]

What’s the Difference Between Authentication and Authorization?

By |September 19th, 2017|Categories: Articles|Tags: , , , , |

In order to protect sensitive data and operations from unwanted access by intruders and malicious actors, developers integrated authentication and authorization features into their applications. Whether you’re running a banking app, a social media website or a blogging platform, these are the two key functionalities that will seal your application against security incidents. While the two terms are often used interchangeably, [...]

A Close Look at SWIFT’s Wire Transfer Authentication Practices

By |June 20th, 2017|Categories: In the News|Tags: , , , |

Published on International Banker by June 20, 2017, by Raz Rafaeli  In February 2016, hackers heisted $81 million from the Bangladesh Bank, cleverly stealing the money via the transfer system of the Society for Worldwide Interbank Financial Telecommunication, commonly referred to as SWIFT. Via a series of subterfuges and with the right timing (scheduling the thefts for a weekend, when staff [...]

IT Nerd: Secret Double Octopus is on the Cutting Edge

By |June 10th, 2017|Categories: In the News|Tags: , , , |

Published on IT Nerd on June 10, 2017 Besides having the coolest name that I’ve come across, Secret Double Octopus is a company that you should keep an eye on. Here’s why. They’re on the bleeding edge of multi factor authentication. Now, I will admit that multi-factor authentication is being implemented by everybody from individual corporations to companies like Google. The thing is, that the belief [...]

Authentication Trends – Getting Beyond First Based Identification

By |May 23rd, 2017|Categories: In the News|Tags: , , |

Published on SC Media on May 23 2017, by Raz Rafaeli Passwords will start to pass away: For years, security experts have slammed passwords, and in its annual prediction of trends, KPMG has declared 2017 the year that passwords finally start to go away. As the reports makes clear: “The security and the business community are starting to realize that they need a [...]

2017 Phone as an Authenticator; Methods, Benefits and Risks

By |May 3rd, 2017|Categories: Articles|Tags: , , , |

Traditionally, OTP tokens (hardware based) have been used to ensure the identity of the party seeking to connect to that sensitive information. But the explosion of mobile devices makes hardware-based tokens impractical. In addition, many users balk at the idea of carrying around a bulky piece of hardware in order to access secure resources. In addition, a 2012 study indicated that companies could save as much as 95% of authentication costs by replacing tokens with smart device-based software solutions. In a study, Gartner said that “phone as a token are the methods of choice in a majority of new and refreshed token deployments, and have a larger installed base than OTP hardware tokens.”

Microsoft is replacing the password — what’s taking its place?

By |May 1st, 2017|Categories: In the News|Tags: , , |

Posted on beta news magazine, May 1, 2017 by Amit Rahav If implemented correctly, this system is a lot more secure than the one that prevails now, where users login with their password, since there are now two or more factors that are being used to authenticate the user It was supposed to have died a long time ago, but, for a near-cadaver, [...]

Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place.