Cloud Phishing Risks and Mitigation

By Shimrit Tzur-David|February 13th, 2020|Categories: Articles|Tags: , , , , |

If you’re running your business in the cloud, you need secure authentication Most of us underestimate the ramifications of password hacks and cloud phishing attacks. If your password falls into the wrong hands, a hacker will gain access to sensitive information, siphon your bank account, or do some other evil act that will inflict damage on your person or organization. But [...]

Cloud Identity Management Challenges

By Amit Rahav|February 4th, 2020|Categories: Articles|Tags: , , , , |

For years, enterprises have been rapidly adopting cloud technologies for many of their data processing tasks. The area of identity management is no exception. To this day, it is still a particularly fast-growing trend within the cloud revolution. Cloud Identity providers, or IDPs, have been taking the world of IT by storm. According to an estimate from Gartner, cloud-based identity is [...]

Passwordless Authentication is BOOMING

By Inbal Voitiz|January 1st, 2020|Categories: Articles|Tags: , , , , |

We’ve always understood security and usability to have an inverse relationship. Passwords are fundamentally flawed. They offer the worst of both worlds – poor usability and poor security. But what if I told you that by letting go of passwords we can finally make usability and security work together, not against each other?

State Sponsored Identity Breaches

By Shimrit Tzur-David|November 27th, 2019|Categories: Articles|Tags: , , |

Cybersecurity officials in Bulgaria revealed news of a massive hack that hit government databases. According to reports, records of more than five million Bulgarians were stolen by hackers from the country's tax revenue office. In a country with a population of just seven million, the scale of the hack means that basically, every Bulgarian adult has had their personal information compromised. [...]

Password Managers – Convenience is Not Security

By Shimrit Tzur-David|November 13th, 2019|Categories: Articles|Tags: , , |

Project Zero has recently disclosed that a security vulnerability left some of LastPass 16 million users exposed to the risk of credential compromise. In an ironic twist, LastPass, the supposedly secure gatekeeper of passwords, could leak the last password used to any website visited.  The vulnerability has since been patched, but maybe it is time we asked ourselves, why the heck [...]

Bypassing 2FA

By Amit Rahav|November 4th, 2019|Categories: Articles|Tags: , , , |

Two factor authentication is all the rage right now. Consumers and business users alike are encouraged to use 2FA. It is often heralded as the ultimate solution to protect us against the dangers of identity theft and corporate data breaches.   Don’t get me wrong, 2FA is immensely better than a primitive login, but it is still not all that it is made out to be. Here is the deal: passwords are fundamentally unsafe. As long as passwords stay in the mix, defending accounts with additional layers of security (no matter how robust ) is a band-aid solution at best. 

Secret Double Octopus Brings FIDO2 Passwordless Security to the Enterprise

By Secret Double Octopus Staff|October 28th, 2019|Categories: Press Release|

Company joins FIDO Alliance, receives FIDO2 certification for industry-leading enterprise authentication solution TEL AVIV, Israel, Oct. 24, 2019 / Secret Double Octopus, the pioneer of Passwordless Enterprise Authentication, announced today that it has received FIDO2 certification for its Octopus Authentication Server v4.0, including support for Active Directory on-premises. FIDO2 is a set of standards that enables easy and secure logins to websites [...]

x

Get in Touch

x

Get in Touch With Sales