Preventing Corporate Account Takeover (CATO)

By |January 14th, 2019|Categories: Articles|Tags: , , |

Businesses of all types and sizes present attractive targets for today’s cybercriminals. This is due to the simple fact that user accounts attached to organizations tend to give access to more assets than private ones. As the sophistication of cyber criminals has increased, the threat of the Corporate Account Takeover (CATO) has grown in tandem. For years, incidents of CATO have, [...]

How will Authentication Look Like in 2019

By |January 2nd, 2019|Categories: Articles|Tags: , , |

With 2019 starting, it’s a good time to look back at 2018 to remember the lessons learned from security incidents involving user authentication and examine how the landscape will look like in the next year.   Poor passwords continue to take their toll Like every year, 2018 taught us that poor passwords haven’t gone away, and they continue to give hackers [...]

Passwordless Authentication is Finally on the Horizon

By |January 1st, 2019|Categories: In the News|Tags: |

Published at infosecurity on December 27, 2018 by Raz Rafaeli For years, we’ve been discussing the vulnerabilities of passwords and the need to ditch them for more robust and secure solutions. However as we leave 2018, we’ve still been hearing about data breaches that are related to poor password choices and authentication policies. Earlier this year, we saw a surge in the use [...]

Passwordless Authentication will Become a Business Advantage in 2019

By |January 1st, 2019|Categories: In the News|Tags: , , |

Published at TechRadar on December 31st by Raz Rafaeli  At RSA’s 2004 security conference, Bill Gates predicted “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just don’t meet the challenge for anything you really want to secure.” A pertinent truth that is often forgotten when discussing the importance of [...]

Virtual Desktop (VDI) Authentication

By |December 20th, 2018|Categories: Articles|Tags: , , , |

The Bring Your Own Device (BYOD) approach is highly embraced by organizations, connecting users to corporate networks to reduce costs or as an easy solution for remote workers. The main beneficiaries of the trend are Virtual Desktop Infrastructure (VDI) such as Citrix, VMware and Microsoft,  For many organizations and companies, Virtual Desktops provide an interesting option to connect their employees to [...]

Privileged Users are Privileged Targets

By |December 17th, 2018|Categories: Articles|Tags: , , |

By any measurement, Privileged Access Management (PAM) has drastically changed the way enterprises protect access to critical systems. Using credential vaults and other session control tools, PAM has allowed managers to maintain privileged identities while significantly decreasing the risk of their compromise. Both industry leaders Forrester and Gartner have placed privileged management as a top priority for CISO’s. And it’s no [...]

Secret Double Octopus Identified as a ‘Representative Vendor’ in Gartner’s 2018 Market Guide for User Authentication

By |December 13th, 2018|Categories: Press Release|

Tel Aviv, Israel– December 13, 2018– Secret Double Octopus, the pioneer of password-free, frictionless authentication technology, announced today it was included in Gartner’s December 2018 Market Guide for User Authentication as one of the report’s Representative Vendors in the user authentication category. In its latest report, Gartner predicts broad adoption of passwordless authentication in the coming years: “By 2022, 60% of [...]

Password- Based Authentication: Vulnerabilities And Alternative Solutions

By |December 5th, 2018|Categories: Articles|Tags: , , , , , |

The password has been the staple of authentication for years. While passwords are still very much a part of our information technology landscape, they have been on the decline for more than a decade. “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just don’t meet the challenge for anything [...]

Credential Stuffing – HSBC Case Study

By |November 26th, 2018|Categories: Articles|Tags: , , |

Earlier this month, HSBC Bank, one of the seven largest financial organizations in the world, issued a warning to its customers that their personal information may have been compromised in a recent data breach. HSBC officials say the breach appeared to run from the 4th through the 14th of October. After spotting the breach, the bank announced that it had "suspended [...]

VPN MFA – The Gateway to the Kingdom

By |November 22nd, 2018|Categories: Articles|Tags: , , |

Enterprises have long used Virtual Private Networks (VPN) to protect their systems and provide a secure work environment. In today’s dynamic business climate, VPN’s have become even more essential. Private networks are now commonly used for organizations that want to give their employees remote, unfettered access to their private servers. With the security and flexibility they provide, it’s no wonder why [...]

Understanding Today’s Data Regulations (Part 2)

By |November 8th, 2018|Categories: Articles|Tags: , |

In our first post on data regulations, we laid out the facts on some of the most important organizations influencing the world of IT’s industry standards. To help understand the ins and outs of these groups matter, and how they affect digital authentication, we put together the who, what, and where of each regulation. In this second post in the series, [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search