Future of Work News Free eNews Subscription

Need to Break Phishing Hooks? Release the Secret Double Octopus


IT teams fine-tune security measures constantly to prevent attacks. Still, for the amount of investment put into cybersecurity, bad actors manage to cause chaos by tricking users into giving up secrets through sophisticated phishing attacks.

Phishing attacks are commonly seen in the form of email in an attempt to receive personal information and passwords. With MFA being more widely implemented, attackers are expanding phishing attempts against enterprises by leveraging man-in-the-middle tooling and push fatigue strategies to bypass traditional MFA.

The reason attackers manage to get in even with traditional MFA implemented is simple. Traditional MFA still contains passwords and most passwords get managed by users. Users with these secrets are susceptible to phishing attacks.

This requires customers with password-centric directory infrastructure to move in a new direction with MFA – maybe toward passwordless authentication. Secret Double Octopus’ phishing-resistant passwordless authentication eliminates passwords from users’ authentication process, which effectively removes them as targets.

SDO’s Octopus Authenticator offers phishing-resistant capabilities, whether online or offline, that enterprises can leverage immediately without the need to re-architect applications or identity directory infrastructure. Most importantly, with the platform, one cause of cyberattacks and data breaches is eliminated with a 360-degree passwordless authentication solution for the workforce.

“We are unveiling these critical capabilities for our customers to fight back the phishing menace,” said Shimrit Tzur-David, co-founder and chief security officer of SDO. “Our first step is to decouple the user from passwords, so IT can increase agility and control on the path to modernizing the identity infrastructure.”

The release enables elimination of end user use of passwords with biometric mobile push, FIDO2 and legacy smart card certificates while working with password directories.

As a result, enterprise applications and services work as they did, but meeting passwordless and phishing-resistance requirements such as the Presidential Executive Order M-22-09’s phishing-resistant MFA mandates.

Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Future of Work Contributor

Related Articles

Rejuvenate the Pulse of Employee Engagement and Proactive Action with Qualtrics

By: Greg Tavarez    5/26/2023

Qualtrics, known for its experience management solutions, introduced advanced features in Qualtrics Pulse, its platform for frequent employee feedback…


An AI Chief of Staff: Automated Work Assistant Xembly has been Equipped with VoicePrint

By: Alex Passett    5/26/2023

Xembly's VoicePrint tags meeting participants automatically to create more precise and accurate follow-up notes, among many other helpful work feature…


Synthace and OpenAI's ChatGPT Revolutionize Biology Experiments

By: Greg Tavarez    5/26/2023

Synthace successfully integrated its platform with OpenAI's ChatGPT, bringing the power of generative AI to biology experiments.


Grammarly Unveils Expanded Product Vision to Transform the AI-Connected Enterprise

By: Greg Tavarez    5/25/2023

Grammarly is introducing an ambitious product vision aimed at shaping the AI-connected enterprise of the future.


Speech-to-Speech Translation: How Orion's Frontline AI Removes Language Barriers for Workforces in Need

By: Alex Passett    5/25/2023

Orion Labs released its Speech-to-Speech (S2ST) solution for varied frontline enterprises to connect deskless workforces, regardless of their native l…