• Authentication in the age of GDPR - Secret double octopus

Making BYOD Work in the Era of GDPR

The ever-expanding popularity of implementing personal, mobile devices as a tool in the workplace has brought unprecedented versatility to the business world. While bring-your-own-device (BYOD) protocols have important benefits from an operational perspective, from a security standpoint, having a slew of additional devices connected to company networks creates a huge liability. Nowhere is this risk more pronounced than when it comes [...]

By |April 24th, 2018|Categories: Articles|Tags: , |
  • Press release Secret double octopus

Secret Double Octopus Appoints Arturo Cazares as EVP of Sales

TEL AVIV, Israel, April 16, 2018 - Secret Double Octopus, the pioneer of password-free, high assurance authentication technology, announced today the appointment of Arturo Cazares as Executive Vice President of Sales. Cazares's appointment comes at a time of significant growth for Secret Double Octopus, with a marked increase in the company's deployments in both the US and Europe. Secret Double Octopus' authentication technology enables companies to replace [...]

By |April 16th, 2018|Categories: Press Release|

A Modern Authentication Model for The Financial Industry

The modern financial sector has been fully integrated into the digital sphere. Today’s online financial domain made up of banks and other intermediaries circulates billions of dollars around the world daily. Understandably, such a domain makes for a highly lucrative target for cybercriminals. Unfortunately, companies have been losing this fight. Hackers are becoming more sophisticated, deploying blended threats against banking and [...]

  • Man in the middle attacks - Secret double octopus

Blockchain Vulnerability to Man-in-the-middle Attacks

Early February this year, researchers found a Man-in-the-middle (MitM) vulnerability in the popular Ledger hardware crypto wallet application that allowed hackers to redirect victims’ funds to their own wallets by changing the destination address of cryptocurrency transactions. The news came as a disappointment to users who considered hardware wallets such as Ledger as the most secure way to store their digital [...]

  • chameleon - Adaptive authentication - Secret Double Octopus

Rethinking Adaptive Authentication

Adaptive Authentication is one of the fastest growing approaches in the field of multifactor authentication. Adaptive systems take advantage of contextual and behavioral aspects to assess the risk of an access attempt and adapt the type of authentication accordingly. For instance, let’s say an access request is emanating from an unusual location or at an unusual time, strong indicators of a [...]

  • Passwords Unsafe - Secret Double Octopus

Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

Published at Entrepreneur on Marth 15.2018 by Raz Rafaeli The password, the most common way to authenticate users around the globe, has been in slow decline for over a decade. Bill Gates famously asserted at an RSA conference in 2004, "There is no doubt that over time, people are going to rely less and less on passwords ... they just don't meet the challenge for [...]

  • Federated Identity vs SSO |Secret Double Octopus

Federated Identity Vs SSO

For today’s enterprise, maintaining an arsenal of effective network tools is all about access. Organizations need to provide access to a slew of online programs and applications to the right people in order to streamline operations. To accomplish this, organizations utilize methods to maximize the use of digital identities for multiple users. Single Sign On (SSO) and its varient called Federated [...]

  • 2018 the year of passwordless authentication | Secret Double Octopus

What Will Authentication Look Like in 2018

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

  • gdpr and authentication | Secret Double Octopus

How GDPR Will Change the Face of Digital Authentication

The highly anticipated General Data Protection Regulations of the European Union (GDPR) will come into effect in a few short months. The laws of GDPR represent a total paradigm shift in IT regulation. While other national and international legislation has focused on laying down specific rules for interacting with digital data, GDPR goes one step further by changing the relationship between [...]

  • MFA mobile | Secret Double Octopus

Finding the Best Mobile Authentication Solution for your Enterprise

In the rapidly growing industry of advanced authentication, mobile solutions play a central role. Mobile apps for authentication have growing in popularity for quite some time. Researchers at Gartner predicted in 2017 that the majority of users would implement some form of mobile authentication in the coming years. Two important factors are driving this trend. First is from the security angle. [...]