Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus Blog | Threats and Alerts

MFA for Office365

Blog

Wednesday December 6, 2017

Multi Factor Authentication with Office 365

Office 365 is one of the most popular sets of subscription suites for productivity software used at the corporate level. The compatibility to a wide spectrum of operating systems and the variety of programs available on Office, make it an obvious choices for many medium size to large businesses. Weak Links in the Chain Office...
Read more

About Us

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Face Recognition - Security or Privacy?

Blog

Monday October 2, 2017

What you need to know about the security and privacy of face recognition logins

Nearly all major smartphone manufacturers want you to unlock your phone by showing your face. While not a new technology, authentication by face recognition has undergone some major transformations in the past years, and tech companies believe it should become the default way you secure and access devices that hold a wealth of your personal...
Read more

The Equifax Breach: How it Went Down

Blog

Tuesday September 26, 2017

The Equifax Breach: How it Went Down

Weeks after the cover was blown about the Equifax breach, the incident has become established as one of the biggest and most detrimental attacks on online consumers ever. The actual volume of data exposed aside, what makes the Equifax hack so bad is not only the highly sensitive nature of the information, but that recovery...
Read more

SS7 -Threat for SMS Authentication

Blog

Wednesday September 6, 2017

SS7 – Yet Another Achilles Heal for SMS Authentication

A series of recent bank fraud hacks throughout Germany highlights the inefficiency of SMS as a second authentication method.
Read more