In the News

We write for different publications around the web, covering pressing issues and new technologies in the field of authentication and get coverage for our work as well,read all about it in our in the news segment

The Quantum Meltdown of Encryption

Published at TechCrunch on Jul 22, 2018 by Shlomi Dolev The world stands at the cusp of one of the greatest breakthroughs in information technology. Huge leaps forward in all fields of computer science, from data analysis to machine learning, will result from this breakthrough. But like all of man’s technological achievements, from the combustion engine to nuclear power, harnessing quantum comes with [...]

By |July 22nd, 2018|Categories: In the News|

Microsoft’s Commandment: Thou Shalt Not Worship (Password) Idols

Published at Infosecurity on May 13, 2018 by Raz Rafaeli Why do we have a situation where hackers are able to take advantage of Microsoft's Active Directory bugs? No matter how you slice it, the error in the model can be traced to one factor – the password. If that were not compromised, hackers would not have an opportunity to carry out [...]

Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

Published at Entrepreneur on Marth 15.2018 by Raz Rafaeli The password, the most common way to authenticate users around the globe, has been in slow decline for over a decade. Bill Gates famously asserted at an RSA conference in 2004, "There is no doubt that over time, people are going to rely less and less on passwords ... they just don't meet the challenge for [...]

Poor Visibility, Weak Passwords Compromise Active Directory

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

Why employees are a businesses weakest link – and how to remedy that

Published in Information-Age, on 18 January 2018, by Raz Rafaeli “People are our greatest asset,” proclaim companies all across the land – but that motto would perhaps be most appropriate to Hacker Incorporated, the loosely-affiliated organisation of cyber-baddies that has made a very successful business of invading computers and networks, for fun and great profit. The requirements for effective cyber-protection in a [...]

The Quantum Computing Apocalypse is Imminent

Published by TechCrunch on January 05, 2018, by Shlomi Dolev In the ancient world, they used cubits as an important data unit, but the new data unit of the future is the qubit — the quantum bits that will change the face of computing. According to experts, quantum computers will be able to create breakthroughs in many of the most complicated [...]

By |January 14th, 2018|Categories: In the News|Tags: |

Will Secure Authentication Remove the Need for Credentials?

Published by Infosecurity on December 18, 2017 by Shimrit Tzur-Davi Passwords – devising them, remembering them, typing them in – can be a hassle for users, but polls on whether users would be willing to use alternative authentication methods are all over the place. Some show that users would rather use “anything” than passwords to authenticate their identities, while others claim [...]

Secret Double Octopus among “50 companies set to boom in 2018”

What it does: Secret Double Octopus is the company behind Octopus Authenticator, which is software that offers secure log-ins without passwords.   Why it's hot: Dealing with passwords, forgetting passwords, secure passwords, hacked passwords, "are all a thing of the past with Secret Double Octopus," says Tzruya, and that saves companies money. Read Full Article

Secret Double Octopus Among CIO’s 20 Most Promising Identity Governance Solution Providers

Eighty percent of hacking-related breaches exploit stolen or weak passwords. Even worse, current security practices of token-based authentication in the form of OTPs and SMS have also been compromised. These challenges are compelling organizations to adopt new approaches to securing their data, systems and overall business interests. Secret Double Octopus, a prominent player in password-free authentication, protects data, systems and identities [...]

Equifax data breach is latest reminder of security lessons

Published in The Hill on September 8, 2017 by Raz Rafaeli The Equifax data breach this week has quickly become recognized as the quite possibly the worst breach in history. Although other hacks dwarf the Equifax incident in sheer size and volume, the Equifax breach is particularly severe due to the breathtaking amount of highly sensitive data it has left open to criminals. The [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search