Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus Blog | Threats and Alerts

Preventing Corporate Account Takeovers

Blog

Monday January 14, 2019

Preventing Corporate Account Takeover (CATO)

Businesses of all types and sizes present attractive targets for today’s cybercriminals. This is due to the simple fact that user accounts attached to organizations tend to give access to more assets than private ones. As the sophistication of cyber criminals has increased, the threat of the Corporate Account Takeover (CATO) has grown in tandem....
Read more

About Octopus

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Privileged Users are Privileged Targets

Blog

Monday December 17, 2018

Privileged Users are Privileged Targets

By any measurement, Privileged Access Management (PAM) has drastically changed the way enterprises protect access to critical systems. Using credential vaults and other session control tools, PAM has allowed managers to maintain privileged identities while significantly decreasing the risk of their compromise. Both industry leaders Forrester and Gartner have placed privileged management as a top...
Read more

Stealing Bank Passwords

Blog

Monday November 26, 2018

Credential Stuffing – HSBC Case Study

Earlier this month, HSBC Bank, one of the seven largest financial organizations in the world, issued a warning to its customers that their personal information may have been compromised in a recent data breach. HSBC officials say the breach appeared to run from the 4th through the 14th of October. After spotting the breach, the...
Read more

Man in the Browser (MITB)

Blog

Thursday November 1, 2018

Man in the Browser (MITB)

On the Octopus Blog, we take a keen interest in the most prevalent hacks used by cybercriminals today. Understanding the science and methodology behind these attacks can help users be better prepared and equipped to protect their data and digital identities. Among the more nefarious techniques employed by hackers, the Man-in-the-Middle (MITM) is a particularly...
Read more

California Weak Password Ban

Blog

Wednesday October 10, 2018

California Weak Password Ban

In new legislation, California decided to ban easy to guess, default passwords. The bill entitled SB-327, or Information Privacy: Connected Devices demands that electronics manufacturers in California equip their products with “reasonable” security features. What does this mean practically for users? All those generic passwords such as “Admin” and “Password” will be prohibited. Starting 2020...
Read more

Private Keys Vulnerabilities

Blog

Thursday August 23, 2018

Private Keys Vulnerabilities to Side Channel Attacks

The Public Key Infrastructure has been the staple of cryptography for over forty years. The simple and ingenious system introduced to the world of information technology the concept of “asymmetric” encryption; a way in which a message can be encrypted, but only unlocked by one particular user. While the public key is accessible to all...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

The SamSam Ransomware

Blog

Wednesday August 8, 2018

SamSam Ransomware: The Enemy of Weak Passwords

In recent years ransomware attacks have become a rampant threat. 2017 saw some of the most destructive waves of ransomware attacks across the world. The most notable of these attacks was the WannaCry outbreak in May, which infected hundreds of thousands of computers in more than 150 countries in the span of a few days....
Read more