Secret Double Octopus Identified as a ‘Representative Vendor’ in Gartner’s 2018 Market Guide for User Authentication

By |December 13th, 2018|Categories: Press Release|

Tel Aviv, Israel– December 13, 2018– Secret Double Octopus, the pioneer of password-free, frictionless authentication technology, announced today it was included in Gartner’s December 2018 Market Guide for User Authentication as one of the report’s Representative Vendors in the user authentication category. In its latest report, Gartner predicts broad adoption of passwordless authentication in the coming years: “By 2022, 60% of [...]

Password- Based Authentication: Vulnerabilities And Alternative Solutions

By |December 5th, 2018|Categories: Articles|Tags: , , , , , |

The password has been the staple of authentication for years. While passwords are still very much a part of our information technology landscape, they have been on the decline for more than a decade. “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just don’t meet the challenge for anything [...]

Credential Stuffing – HSBC Case Study

By |November 26th, 2018|Categories: Articles|Tags: , , |

Earlier this month, HSBC Bank, one of the seven largest financial organizations in the world, issued a warning to its customers that their personal information may have been compromised in a recent data breach. HSBC officials say the breach appeared to run from the 4th through the 14th of October. After spotting the breach, the bank announced that it had "suspended [...]

VPN MFA – The Gateway to the Kingdom

By |November 22nd, 2018|Categories: Articles|Tags: , , |

Enterprises have long used Virtual Private Networks (VPN) to protect their systems and provide a secure work environment. In today’s dynamic business climate, VPN’s have become even more essential. Private networks are now commonly used for organizations that want to give their employees remote, unfettered access to their private servers. With the security and flexibility they provide, it’s no wonder why [...]

Understanding Today’s Data Regulations (Part 2)

By |November 8th, 2018|Categories: Articles|Tags: , |

In our first post on data regulations, we laid out the facts on some of the most important organizations influencing the world of IT’s industry standards. To help understand the ins and outs of these groups matter, and how they affect digital authentication, we put together the who, what, and where of each regulation. In this second post in the series, [...]

Man in the Browser (MITB)

By |November 1st, 2018|Categories: Articles|Tags: , , |

On the Octopus Blog, we take a keen interest in the most prevalent hacks used by cybercriminals today. Understanding the science and methodology behind these attacks can help users be better prepared and equipped to protect their data and digital identities. Among the more nefarious techniques employed by hackers, the Man-in-the-Middle (MITM) is a particularly nasty one. A well-executed attack can [...]

Zero Password Multifactor Authentication Comes to Enterprise Mac Users

By |October 24th, 2018|Categories: Articles|Tags: |

Secret Double Octopus, the leader in password-free, high assurance authentication is proud to announce its latest innovation: Password-Free Login for Mac Users Today’s enterprises require the capability to access their data through a full range of mediums, either on premises or in the cloud. More often than not, this means harnessing management tools native to Windows such as Active Directory. But [...]

Understanding Today’s Data Regulations Pt.1

By |October 23rd, 2018|Categories: Articles|Tags: , , , |

Data regulation. Some are restrictions aim to protect users and some are a framework for better organizations security. The modern phenomenon is set as the legal system is catching up with the ever-expanding connected world we live at, if you agree with regulatory oversight or not the sweeping effects on the world of digital information is enormous.How companies handle private data, [...]

California Weak Password Ban

By |October 10th, 2018|Categories: Articles|Tags: , , |

In new legislation, California decided to ban easy to guess, default passwords. The bill entitled SB-327, or Information Privacy: Connected Devices demands that electronics manufacturers in California equip their products with "reasonable" security features. What does this mean practically for users? All those generic passwords such as “Admin” and “Password” will be prohibited. Starting 2020 when the law comes into effect, [...]

The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them

By |October 8th, 2018|Categories: Articles|Tags: , , |

In the realm on protecting digital information, a man-in-the-middle (MITM) attack is one of the worst things that can happen to an individual or organization. MITM attacks happen when an unauthorized actor manages to intercept and decipher communications between two parties and monitors or manipulates the exchanged information for malicious purposes. For instance, hackers can stage MITM attacks to steal sensitive [...]

The UN Unexpected Example of Poor Password Management

By |October 4th, 2018|Categories: Articles|Tags: , , , |

A couple weeks ago, we covered the West Australian government’s security audit here on the Octopus Blog. The section of the governmental audit’s research into cyber security practices unveiled some pretty disturbing facts. Given the opportunity, users will choose the most obvious, easiest to guess passwords, leaving them wide-open targets for cyber criminals. While the size and scope of this phenomenon [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search