Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus Blog | Threats and Alerts

Preventing Man in the Middle Attacks

Blog

Saturday August 8, 2020

The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them

In the realm on protecting digital information, a man-in-the-middle (MITM) attack is one of the worst things that can happen to an individual or organization. MITM attacks happen when an unauthorized actor manages to intercept and decipher communications between two parties and monitors or manipulates the exchanged information for malicious purposes. And while the term...
Read more

About Octopus

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Fight Insider Threats with Passwordless

Blog

Monday July 20, 2020

Fight Insider Threats with Passwordless Authentication 

What Is an Insider Threat?  Formally speaking, an insider threat is any vulnerability, exploit, or potential means of attack created, intentionally or unintentionally, by legitimate users within the organization. These ‘insiders’ may be currently or formerly employed by the attacked organization, or outsiders contracted to perform services and given lawful access by the company. In the context of cybersecurity, insider threat usually relates to the use of privileged accounts in order to abuse resources, interfere with processes, or access sensitive data.  Needless to say,...
Read more

Passwordless for Supply Chain attacks

Blog

Monday April 27, 2020

Supply Chain attacks: mitigating hidden risks with Passwordless Authentication

In today’s globalized world where efficiency and speed are paramount, no organization is an island. Inevitably, we all must place trust into vendors, third-party services, and software providers to keep the business going.  As a direct consequence of the global move towards distributed enterprise, hackers are increasingly utilizing blind spots in supply chains to target...
Read more

Universities' Cyber Security

Blog

Monday April 13, 2020

Universities and Cyber Security: A Lesson From Iranian Hackers

Well before the COVID-19 pandemic, the headlines were dominated once again by the notion of state-sponsored cyberwarfare. Due to the surge in tensions between Iran and the U.S., and in the wake of the strike that killed top Iranian commander Qassem Soleimani, the Department of Homeland Security issued a warning of a potential retaliatory cyberattack...
Read more

SIM Swapping is a Real Threat

Blog

Monday February 24, 2020

SIM Swapping – The End Of 2nd Factor Authentication?

Many online services allow, and sometimes require, users to secure their accounts with a registered mobile phone number. This is a common and trusted method for two-factor authentication (2FA), using a phone call or an SMS message to verify identity when logging in from a new device or resetting a password. This standard approach, however,...
Read more

Solving Cloud Phishing Attacks

Blog

Thursday February 13, 2020

Cloud Phishing Risks and Mitigation

If you’re running your business in the cloud, you need secure authentication Most of us underestimate the ramifications of password hacks and cloud phishing attacks. If your password falls into the wrong hands, a hacker will gain access to sensitive information, siphon your bank account, or do some other evil act that will inflict damage...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

State Sponsored Identity Breaches

Blog

Wednesday November 27, 2019

State Sponsored Identity Breaches

Cybersecurity officials in Bulgaria revealed news of a massive hack that hit government databases. According to reports, records of more than five million Bulgarians were stolen by hackers from the country’s tax revenue office. In a country with a population of just seven million, the scale of the hack means that basically, every Bulgarian adult...
Read more