Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus Blog | Threats and Alerts

Stopping MitM Attacks


Thursday June 14, 2018

Stopping Man-In-The-Middle Attacks with Cryptography

Man-in-the-middle (MITM) attacks – where an attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other – are a very real threat, especially when it comes to authentication. Various solutions have been put forward to prevent, or at least manage, this threat. These have met...
Read more

About Octopus

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Is Quantum Computing Threatning Crypto?


Wednesday April 25, 2018

How Quantum Computing Could Wreak Havoc on Cryptocurrency

Published in TheNextWeb on April 15 2018, by Raz Refaeli Quantum computing is promising to be one of the biggest technological revolutions of the modern era. By harnessing the power of quantum mechanics, machines will be able to achieve data processing of speed and complexity unattainable with current computers. Traditional computers are based on a binary model...
Read more

Blockchain Man-in-the-middle Attacks


Wednesday April 11, 2018

Blockchain Vulnerability to Man-in-the-middle Attacks

Early February this year, researchers found a Man-in-the-middle (MITM) vulnerability in the popular Ledger hardware crypto wallet application that allowed hackers to redirect victims’ funds to their own wallets by changing the destination address of cryptocurrency transactions. The news came as a disappointment to users who considered hardware wallets such as Ledger as the most...
Read more

Password Vulnerabilities (Pt. 2)


Wednesday February 7, 2018

What you need to know about password vulnerabilities (Pt. 2)

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords – Weak Passwords Risk As computing power...
Read more

Password Vulnerabilities (Pt. 1)


Thursday February 1, 2018

What you need to know about password vulnerabilities (Pt. 1)

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to...
Read more

The Threat to Identity Security


Wednesday December 20, 2017

Taking on the Growing Threat to Identity Security

The need for a robust identity security and access management (IAM) strategy is one of the central concerns of securing enterprise IT. Strong identity solutions can help firms boost their productivity by streamlining user access in addition to strengthening the overall security of the organization. But with identity theft steadily on the rise in recent...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

Your VPN needs 2FA


Wednesday December 13, 2017

Why your corporate VPN needs two-factor authentication (2FA)

Virtual Private Networks (VPN) are hugely popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote nodes and your servers, VPNs solve some very important problems, such as preventing hackers from finding and breaking into your servers while enabling your employees to...
Read more