Learn all about password-alternatives on the Octopusblog. Read about how Octopus Authenticator tools are replacing traditional password based methods.

  • Tokens Hard, Soft And What’s In Between - Secret Double Octopus

Tokens – Hard, Soft And What’s In Between

Proving your identity in order to authenticate yourself and gain access to some kind of system, is more of a challenge than most people realize. This process has to be designed so that on one hand it’s as easy as possible for the user of the system to gain access, while on the other it’s as difficult as possible for someone [...]

  • What is Zero Trust authentication secret double octopus

What is Zero Trust Authentication?

“Zero Trust” is a concept that can revolutionize the way people interact with networks, and each other. At its core, it’s a different approach to network security, but its practical implications are far-reaching. In this article, we dive into Zero Trust Authentication, as well as clarify and understand the basics of the approach and the practical ramifications of it.   The [...]

  • chameleon - Adaptive authentication - Secret Double Octopus

Rethinking Adaptive Authentication

Adaptive Authentication is one of the fastest growing approaches in the field of multifactor authentication. Adaptive systems take advantage of contextual and behavioral aspects to assess the risk of an access attempt and adapt the type of authentication accordingly. For instance, let’s say an access request is emanating from an unusual location or at an unusual time, strong indicators of a [...]

  • Passwords Unsafe - Secret Double Octopus

Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

Published at Entrepreneur on Marth 15.2018 by Raz Rafaeli The password, the most common way to authenticate users around the globe, has been in slow decline for over a decade. Bill Gates famously asserted at an RSA conference in 2004, "There is no doubt that over time, people are going to rely less and less on passwords ... they just don't meet the challenge for [...]

  • Federated Identity vs SSO |Secret Double Octopus

Federated Identity Vs SSO

For today’s enterprise, maintaining an arsenal of effective network tools is all about access. Organizations need to provide access to a slew of online programs and applications to the right people in order to streamline operations. To accomplish this, organizations utilize methods to maximize the use of digital identities for multiple users. Single Sign On (SSO) and its varient called Federated [...]

  • 2018 the year of passwordless authentication | Secret Double Octopus

What Will Authentication Look Like in 2018

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

  • Password vulnerabilities - secret double octopus

What you need to know about password vulnerabilities (Pt. 2)

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

  • compromise active directory

Poor Visibility, Weak Passwords Compromise Active Directory

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

  • Password vulnerabilities - secret double octopus

What you need to know about password vulnerabilities (Pt. 1)

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]

  • employee authentication security

Why employees are a businesses weakest link – and how to remedy that

Published in Information-Age, on 18 January 2018, by Raz Rafaeli “People are our greatest asset,” proclaim companies all across the land – but that motto would perhaps be most appropriate to Hacker Incorporated, the loosely-affiliated organisation of cyber-baddies that has made a very successful business of invading computers and networks, for fun and great profit. The requirements for effective cyber-protection in a [...]