Future of Work News Free eNews Subscription

Need to Break Phishing Hooks? Release the Secret Double Octopus


IT teams fine-tune security measures constantly to prevent attacks. Still, for the amount of investment put into cybersecurity, bad actors manage to cause chaos by tricking users into giving up secrets through sophisticated phishing attacks.

Phishing attacks are commonly seen in the form of email in an attempt to receive personal information and passwords. With MFA being more widely implemented, attackers are expanding phishing attempts against enterprises by leveraging man-in-the-middle tooling and push fatigue strategies to bypass traditional MFA.

The reason attackers manage to get in even with traditional MFA implemented is simple. Traditional MFA still contains passwords and most passwords get managed by users. Users with these secrets are susceptible to phishing attacks.

This requires customers with password-centric directory infrastructure to move in a new direction with MFA – maybe toward passwordless authentication. Secret Double Octopus’ phishing-resistant passwordless authentication eliminates passwords from users’ authentication process, which effectively removes them as targets.

SDO’s Octopus Authenticator offers phishing-resistant capabilities, whether online or offline, that enterprises can leverage immediately without the need to re-architect applications or identity directory infrastructure. Most importantly, with the platform, one cause of cyberattacks and data breaches is eliminated with a 360-degree passwordless authentication solution for the workforce.

“We are unveiling these critical capabilities for our customers to fight back the phishing menace,” said Shimrit Tzur-David, co-founder and chief security officer of SDO. “Our first step is to decouple the user from passwords, so IT can increase agility and control on the path to modernizing the identity infrastructure.”

The release enables elimination of end user use of passwords with biometric mobile push, FIDO2 and legacy smart card certificates while working with password directories.

As a result, enterprise applications and services work as they did, but meeting passwordless and phishing-resistance requirements such as the Presidential Executive Order M-22-09’s phishing-resistant MFA mandates.

Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Future of Work Contributor


Related Articles

ICYMI: What's Developing Around the Future of Work?

By: Greg Tavarez    6/21/2024

Here are a few articles compiled into one for readers interested in developments around the future of work.


Fortune 500 Company Boosts Quality Monitoring with Verint Quality Bots

By: Tracey E. Schelmetic    6/21/2024

Verint announced that a Fortune 500 brand that recently deployed Verint Quality Bots to modernize its quality program achieved significant AI business…


Nureva's HDL Pro Series Goes Zoom Room Official

By: Greg Tavarez    6/20/2024

Nureva's HDL pro series audio systems are certified by Zoom for a combination of audio performance and Zoom Room functionality.


AI Customer Support Automation Company Cognigy Announces $100 Million in Funding

By: Tracey E. Schelmetic    6/20/2024

AI customer service automation company Cognigy recently announced that it raised $100 million in Series C funding.


Tethr and Awaken Merge to Create AI-Driven Contact Center Intelligence Solution

By: Tracey E. Schelmetic    6/20/2024

AI-powered conversational intelligence company Tethr and contact center solutions provider Awaken Intelligence Ltd. recently announced a definitive ag…