Multi Factor Authentication

Read all about the best Multi Factor Authentication methods on the Octopusblog. Learn about the difference between authentication factors and there pros and cons.

A Close Look at SWIFT’s Wire Transfer Authentication Practices

By Secret Double Octopus Staff|June 20th, 2017|Categories: In the News|Tags: , , , |

Published on International Banker by June 20, 2017, by Raz Rafaeli  In February 2016, hackers heisted $81 million from the Bangladesh Bank, cleverly stealing the money via the transfer system of the Society for Worldwide Interbank Financial Telecommunication, commonly referred to as SWIFT. Via a series of subterfuges and with the right timing (scheduling the thefts for a weekend, when staff [...]

IT Nerd: Secret Double Octopus is on the Cutting Edge

By Secret Double Octopus Staff|June 10th, 2017|Categories: In the News|Tags: , , , |

Published on IT Nerd on June 10, 2017 Besides having the coolest name that I’ve come across, Secret Double Octopus is a company that you should keep an eye on. Here’s why. They’re on the bleeding edge of multi factor authentication. Now, I will admit that multi-factor authentication is being implemented by everybody from individual corporations to companies like Google. The thing is, that the belief [...]

Authentication Trends – Getting Beyond First Based Identification

By Secret Double Octopus Staff|May 23rd, 2017|Categories: In the News|Tags: , , |

Published on SC Media on May 23 2017, by Raz Rafaeli Passwords will start to pass away: For years, security experts have slammed passwords, and in its annual prediction of trends, KPMG has declared 2017 the year that passwords finally start to go away. As the reports makes clear: “The security and the business community are starting to realize that they need a [...]

2017 Phone as an Authenticator; Methods, Benefits and Risks

By Secret Double Octopus Staff|May 3rd, 2017|Categories: Articles|Tags: , , , |

Traditionally, OTP tokens (hardware based) have been used to ensure the identity of the party seeking to connect to that sensitive information. But the explosion of mobile devices makes hardware-based tokens impractical. In addition, many users balk at the idea of carrying around a bulky piece of hardware in order to access secure resources. In addition, a 2012 study indicated that companies could save as much as 95% of authentication costs by replacing tokens with smart device-based software solutions. In a study, Gartner said that “phone as a token are the methods of choice in a majority of new and refreshed token deployments, and have a larger installed base than OTP hardware tokens.”

Microsoft is replacing the password — what’s taking its place?

By Secret Double Octopus Staff|May 1st, 2017|Categories: In the News|Tags: , , |

Posted on beta news magazine, May 1, 2017 by Amit Rahav If implemented correctly, this system is a lot more secure than the one that prevails now, where users login with their password, since there are now two or more factors that are being used to authenticate the user It was supposed to have died a long time ago, but, for a near-cadaver, [...]

x

Get in Touch

x

Get in Touch With Sales