• Certification as single point of failure - secret double octopus

Circumventing The Single Point of Failure – Goals in Authentication

Securing our online communications has always been an ongoing task, one that has to stay in-synch with our ever-expanding communication technology. For years, the basis of this security has been Secure Sockets Layer (SSL) cryptography, now in its more updated version of Transport Layer Security (TLS). These protocols work by generating keys for every connection made between parties (say, your internet [...]

  • No KNOWLEDGE proof - Secret Double Octopus

Zero Knowledge Proof – What Peggy Knows About Victor

Zero knowledge proof authentication is the basis of modern-age authentication. It allows for the highest level of security, by ensuring passwords, transactions and conversations don’t get compromised when transferred over an unsecured connection. In this article we will look at zero knowledge proof to understand the need for it, how it works, and where it’s being utilized to verify parties today. [...]

  • What is Zero Trust authentication secret double octopus

What is Zero Trust Authentication?

“Zero Trust” is a concept that can revolutionize the way people interact with networks, and each other. At its core, it’s a different approach to network security, but its practical implications are far-reaching. In this article, we dive into Zero Trust Authentication, as well as clarify and understand the basics of the approach and the practical ramifications of it.   The [...]

  • Active directory and LDAP - Secret double octopus

LDAP, Active Directory and Federated Identity: What You Need to Know

Managing identities across an enterprise is one of the bigger challenges facing the world of digital security. In a company where large numbers of users access multiple applications in a diverse work environment, managers need reliable tools that allow smooth access for workers, while maintaining strong authentication standards.   Making Some Order When looking at the most common tools used in [...]

By |May 14th, 2018|Categories: Articles|
  • Active directory - Directory physical

Microsoft’s Commandment: Thou Shalt Not Worship (Password) Idols

Published at Infosecurity on May 13, 2018 by Raz Rafaeli Why do we have a situation where hackers are able to take advantage of Microsoft's Active Directory bugs? No matter how you slice it, the error in the model can be traced to one factor – the password. If that were not compromised, hackers would not have an opportunity to carry out [...]

  • PCIs-new-regulations-Secret-Double-Octopus

Tackling the PCI’s New Authentication Regulations

The latest standards governing the world of digital payments have come into effect. On 1 February 2018, the new Data Security Standards of the Payment Card Industry’s (PCI) Council, or PCI DSS, came into effect. These new standards upgraded many protocols that used to be merely “best practices”, to full requirements. The updated PCI DSS is a significant shift from earlier [...]

  • NY-DFS-Cyber-Regulations-Double-Secret-Octopus

Digital Authentication in the Age of NY’s DFS Cyber Regulations

Amongst the wide range of data legislation being cranked out by governments over the past several years, the New York State Department of Financial Security’s (NYS DFS) cyber regulations are some of the most important and influential. As New York City is very much the “financial capital” of the globe, regulations codified by State authorities affect a large swath of the [...]

How Quantum Computing Could Wreak Havoc on Cryptocurrency

Published in TheNextWeb on April 15 2018, by Raz Refaeli Quantum computing is promising to be one of the biggest technological revolutions of the modern era. By harnessing the power of quantum mechanics, machines will be able to achieve data processing of speed and complexity unattainable with current computers. Traditional computers are based on a binary model on a system of switches that [...]

By |April 25th, 2018|Categories: Articles|Tags: |
  • Authentication in the age of GDPR - Secret double octopus

Making BYOD Work in the Era of GDPR

The ever-expanding popularity of implementing personal, mobile devices as a tool in the workplace has brought unprecedented versatility to the business world. While bring-your-own-device (BYOD) protocols have important benefits from an operational perspective, from a security standpoint, having a slew of additional devices connected to company networks creates a huge liability. Nowhere is this risk more pronounced than when it comes [...]

By |April 24th, 2018|Categories: Articles|Tags: , |
  • Press release Secret double octopus

Secret Double Octopus Appoints Arturo Cazares as EVP of Sales

TEL AVIV, Israel, April 16, 2018 - Secret Double Octopus, the pioneer of password-free, high assurance authentication technology, announced today the appointment of Arturo Cazares as Executive Vice President of Sales. Cazares's appointment comes at a time of significant growth for Secret Double Octopus, with a marked increase in the company's deployments in both the US and Europe. Secret Double Octopus' authentication technology enables companies to replace [...]

By |April 16th, 2018|Categories: Press Release|