• Passwords Unsafe - Secret Double Octopus

Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

By |March 14th, 2018|Categories: In the News|Tags: |

Published at Entrepreneur on Marth 15.2018 by Raz Rafaeli The password, the most common way to authenticate users around the globe, has been in slow decline for over a decade. Bill Gates famously asserted at an RSA conference in 2004, "There is no doubt that over time, people are going to rely less and less on passwords ... they just don't meet the challenge for [...]

  • Federated Identity vs SSO |Secret Double Octopus

Federated Identity Vs SSO

By |March 13th, 2018|Categories: Articles|Tags: , |

For today’s enterprise, maintaining an arsenal of effective network tools is all about access. Organizations need to provide access to a slew of online programs and applications to the right people in order to streamline operations. To accomplish this, organizations utilize methods to maximize the use of digital identities for multiple users. Single Sign On (SSO) and its varient called Federated [...]

  • 2018 the year of passwordless authentication | Secret Double Octopus

What Will Authentication Look Like in 2018

By |March 6th, 2018|Categories: Articles|Tags: , |

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

  • gdpr and authentication | Secret Double Octopus

How GDPR Will Change the Face of Digital Authentication

By |February 28th, 2018|Categories: Articles|Tags: , , , |

The highly anticipated General Data Protection Regulations of the European Union (GDPR) will come into effect in a few short months. The laws of GDPR represent a total paradigm shift in IT regulation. While other national and international legislation has focused on laying down specific rules for interacting with digital data, GDPR goes one step further by changing the relationship between [...]

  • MFA mobile | Secret Double Octopus

Finding the Best Mobile Authentication Solution for your Enterprise

By |February 21st, 2018|Categories: Articles|Tags: , , |

In the rapidly growing industry of advanced authentication, mobile solutions play a central role. Mobile apps for authentication have growing in popularity for quite some time. Researchers at Gartner predicted in 2017 that the majority of users would implement some form of mobile authentication in the coming years. Two important factors are driving this trend. First is from the security angle. [...]

  • cost of multifactor authentication | Secret Double Octopus

What is the Total Cost of Deploying Multi Factor Authentication for your Business?

By |February 14th, 2018|Categories: Articles|Tags: , , |

Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]

  • Password vulnerabilities - secret double octopus

What you need to know about password vulnerabilities (Pt. 2)

By |February 7th, 2018|Categories: Articles|Tags: , , , |

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

  • compromise active directory

Poor Visibility, Weak Passwords Compromise Active Directory

By |February 5th, 2018|Categories: In the News|Tags: , , |

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

  • Password vulnerabilities - secret double octopus

What you need to know about password vulnerabilities (Pt. 1)

By |February 1st, 2018|Categories: Articles|Tags: , |

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]

  • push notification authentication

How push notifications can revolutionize your authentication security

By |January 23rd, 2018|Categories: Articles|Tags: , |

The many horror stories that regularly surface on the web make it certain beyond the shadow of a doubt that plain passwords are a cumbersome and bad security practice. A recent survey by Secret Double Octopus found that the outstanding majority of corporate employees are eyeing password-free technologies as their preferred method of authentication, both from a security and an ease-of-use [...]