Eighty percent of hacking-related breaches exploit stolen or weak passwords. Even worse, current security practices of token-based authentication in the form of OTPs and SMS have also been compromised. These challenges are compelling organizations to adopt new approaches to securing their data, systems and overall business interests. Secret Double Octopus, a prominent player in password-free authentication, protects data, systems and identities [...]
Finding strong customer authentication solutions is likely the single biggest security challenge affecting day-to-day online operations. What is needed is a new paradigm of security solutions that span the whole chain of a transaction.
How can you make sure that only you can access the critical functionality and information of your servers?
For the full report go to: https://doubleoctopus.com/facing-a-future-without-passwords/ In with the new, out with the old This pretty much sums up the dominating trends in authentication methods over the past several years. With many traditional methods depreciated, more and more replacement technologies have been making an entrance into the market. The question for businesses is which particular method will be the most adequate [...]
Tel Aviv, Israel- October 30, 2017- The results of a survey conducted by Secret Double Octopus, the pioneer of password-free, keyless authentication technology, found that among employees of medium (1000-5000) and large (5000+) enterprises, 81% of respondents perceive Face ID as trustworthy and 91% think it will be easy to use. Currently, Touch ID is the leading alternative to passwords with [...]
One way to ensure that the secrets we have are top-notch is by eliminating the password altogether – and instead, using a strong mobile authenticator to execute authentication.
Secret Double Octopus Selected as Top Cybersecurity Company on Momentum Partners’ Q3 2017 Watch List
Tel Aviv, Israel- October 24, 2017- Secret Double Octopus, the pioneer of password-free, keyless authentication technology authentication technology, announced today it was chosen as a top cybersecurity company by Momentum Partners based off of the firm’s analysis of industry trends and current innovation in cybersecurity issues. Each quarter, Momentum Partners, a Silicon Valley-based cybersecurity investment bank, selects 10 companies for its [...]
Two factor methods help improve user account security make it considerably harder for cybercriminals to gain unwanted access to a Linux machine.
Federated identity management (FIM) is an arrangement that can be made among multiple enterprises that let subscribers use the same identification data to obtain access to an application, program, and even the networks of all members of the group. Identity federation offers economic advantages, as well as logistical ones, to enterprises and their network subscribers. Anyone who has had the experience [...]
Of all data breach targets in the first half of 2017, the healthcare industry was number two, right behind the financial industry