• Active directory and LDAP - Secret double octopus

LDAP, Active Directory and Federated Identity: What You Need to Know

By |May 14th, 2018|Categories: Articles|Tags: , |

Managing identities across an enterprise is one of the bigger challenges facing the world of digital security. In a company where large numbers of users access multiple applications in a diverse work environment, managers need reliable tools that allow smooth access for workers, while maintaining strong authentication standards.   Making Some Order When looking at the most common tools used in [...]

  • Active directory - Directory physical

Microsoft’s Commandment: Thou Shalt Not Worship (Password) Idols

By |May 13th, 2018|Categories: In the News|Tags: |

Published at Infosecurity on May 13, 2018 by Raz Rafaeli Why do we have a situation where hackers are able to take advantage of Microsoft's Active Directory bugs? No matter how you slice it, the error in the model can be traced to one factor – the password. If that were not compromised, hackers would not have an opportunity to carry out [...]

  • PCIs-new-regulations-Secret-Double-Octopus

Tackling the PCI’s New Authentication Regulations

By |May 7th, 2018|Categories: Articles|Tags: , |

The latest standards governing the world of digital payments have come into effect. On 1 February 2018, the new Data Security Standards of the Payment Card Industry’s (PCI) Council, or PCI DSS, came into effect. These new standards upgraded many protocols that used to be merely “best practices”, to full requirements. The updated PCI DSS is a significant shift from earlier [...]

  • NY-DFS-Cyber-Regulations-Double-Secret-Octopus

Digital Authentication in the Age of NY’s DFS Cyber Regulations

By |May 2nd, 2018|Categories: Articles|Tags: , |

Amongst the wide range of data legislation being cranked out by governments over the past several years, the New York State Department of Financial Security’s (NYS DFS) cyber regulations are some of the most important and influential. As New York City is very much the “financial capital” of the globe, regulations codified by State authorities affect a large swath of the [...]

How Quantum Computing Could Wreak Havoc on Cryptocurrency

By |April 25th, 2018|Categories: Articles|Tags: |

Published in TheNextWeb on April 15 2018, by Raz Refaeli Quantum computing is promising to be one of the biggest technological revolutions of the modern era. By harnessing the power of quantum mechanics, machines will be able to achieve data processing of speed and complexity unattainable with current computers. Traditional computers are based on a binary model on a system of switches that [...]

  • Authentication in the age of GDPR - Secret double octopus

Making BYOD Work in the Era of GDPR

By |April 24th, 2018|Categories: Articles|Tags: , |

The ever-expanding popularity of implementing personal, mobile devices as a tool in the workplace has brought unprecedented versatility to the business world. While bring-your-own-device (BYOD) protocols have important benefits from an operational perspective, from a security standpoint, having a slew of additional devices connected to company networks creates a huge liability. Nowhere is this risk more pronounced than when it comes [...]

  • Press release Secret double octopus

Secret Double Octopus Appoints Arturo Cazares as EVP of Sales

By |April 16th, 2018|Categories: Press Release|

TEL AVIV, Israel, April 16, 2018 - Secret Double Octopus, the pioneer of password-free, high assurance authentication technology, announced today the appointment of Arturo Cazares as Executive Vice President of Sales. Cazares's appointment comes at a time of significant growth for Secret Double Octopus, with a marked increase in the company's deployments in both the US and Europe. Secret Double Octopus' authentication technology enables companies to replace [...]

A Modern Authentication Model for The Financial Industry

By |April 16th, 2018|Categories: Articles|Tags: , |

The modern financial sector has been fully integrated into the digital sphere. Today’s online financial domain made up of banks and other intermediaries circulates billions of dollars around the world daily. Understandably, such a domain makes for a highly lucrative target for cybercriminals. Unfortunately, companies have been losing this fight. Hackers are becoming more sophisticated, deploying blended threats against banking and [...]

  • Man in the middle attacks - Secret double octopus

Blockchain Vulnerability to Man-in-the-middle Attacks

By |April 11th, 2018|Categories: Articles|Tags: , |

Early February this year, researchers found a Man-in-the-middle (MitM) vulnerability in the popular Ledger hardware crypto wallet application that allowed hackers to redirect victims’ funds to their own wallets by changing the destination address of cryptocurrency transactions. The news came as a disappointment to users who considered hardware wallets such as Ledger as the most secure way to store their digital [...]

  • chameleon - Adaptive authentication - Secret Double Octopus

Rethinking Adaptive Authentication

By |March 28th, 2018|Categories: Articles|Tags: , , |

Adaptive Authentication is one of the fastest growing approaches in the field of multifactor authentication. Adaptive systems take advantage of contextual and behavioral aspects to assess the risk of an access attempt and adapt the type of authentication accordingly. For instance, let’s say an access request is emanating from an unusual location or at an unusual time, strong indicators of a [...]