Blog

The latest ideas and insights for cybersecurity leaders from Secret Double Octopus’ passwordless identity authentication experts.
Threats and Attacks
New Threats and Attacks The Stryker/Handala Wake-Up Call: Passwordless MFA Has to Cover the Entire Enterprise The Stryker/Handala Wake-Up Call: Passwordless MFA Has to Cover the Entire Enterprise
Standards and Regulations
New Standards and Regulations The Financial-Services Authentication Reset: MFA, Phishing Resistance, and What Regulators Now Expect The Financial-Services Authentication Reset: MFA, Phishing Resistance, and What Regulators Now Expect
Passwordless MFA
Passwordless MFA Credit Unions and Small Banks Deserve Phishing-Resistant MFA Too Credit Unions and Small Banks Deserve Phishing-Resistant MFA Too
Threats and Attacks
Threats and Attacks When Legacy Is the Weakest Link: Lessons from the Oracle Breach When Legacy Is the Weakest Link: Lessons from the Oracle Breach
Passwordless MFA
Passwordless MFA A New Era of Simplicity and Security A New Era of Simplicity and Security
Passwordless MFA
Passwordless MFA Halfway Security Is No Security: When Windows Hello Leaves the Door Open Halfway Security Is No Security: When Windows Hello Leaves the Door Open
Standards and Regulations
Standards and Regulations CISO Insights: How Financial Orgs Can Tackle MFA Compliance at Scale CISO Insights: How Financial Orgs Can Tackle MFA Compliance at Scale
Passwordless MFA
Passwordless MFA Passwordless Authentication Helps Law Firms Maximize Security— and Billable Hours  Passwordless Authentication Helps Law Firms Maximize Security— and Billable Hours 
Access Management and MFA
Access Management and MFA The Future of SSO: Passwordless for Everything in the Enterprise The Future of SSO: Passwordless for Everything in the Enterprise
12314