Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.
Threats and Attacks
Threats and Attacks How to Avoid MFA Fatigue and Prevent Attacks How to Avoid MFA Fatigue and Prevent Attacks
Threats and Attacks
Threats and Attacks IBM Data Breach Report Shows Credential-based Attack Costs on the Rise IBM Data Breach Report Shows Credential-based Attack Costs on the Rise
Threats and Attacks
Threats and Attacks How to Stop Hackers from Bypassing 2FA How to Stop Hackers from Bypassing 2FA
Threats and Attacks
Threats and Attacks Phishing 2024: Vishing, Smishing and Quishing - AI!  Phishing 2024: Vishing, Smishing and Quishing - AI! 
Threats and Attacks
Threats and Attacks AI to Raise the Stakes for Phishing by 2025 – Take Away Attackers’ Favorite Tool First AI to Raise the Stakes for Phishing by 2025 – Take Away Attackers’ Favorite Tool First
Threats and Attacks
Threats and Attacks The CISO’s MFA dilemma: “Did I do enough to stop a breach?” The CISO’s MFA dilemma: “Did I do enough to stop a breach?”
Threats and Attacks
Threats and Attacks Stop Account Takeover (ATO) With Strong Authentication Stop Account Takeover (ATO) With Strong Authentication
Threats and Attacks
Threats and Attacks Understanding Credential Stuffing Understanding Credential Stuffing
Threats and Attacks
Threats and Attacks How to Protect MFA from SIM Swapping How to Protect MFA from SIM Swapping