Good Contents Are Everywhere, But Here, We Deliver The Best of The Best.Please Hold on!
Your address will show here +12 34 56 78
Ideas on how best to protect cyber information belonging to individuals, organizations and governments are constantly evolving, with a mix of older and newer methods existing side-by-side. Passwords and keys are still widely used, as two-factor authentication also grows. Surprisingly few people, though, are talking about secret sharing, a security option that takes data and uses randomization to compute different numbers (shares) that only together define the secret/data. TechDigg spoke to Amit Rahav, VP Marketing & Business Development at Secret Double Octopus to find out more about secret sharing.

What exactly is secret sharing and how does it work?

The system that we use at Secret Double Octopus utilizes multiple security matches using multiple routes – based on “secret sharing”- an algorithm established in 1979 by cryptographers Adi Shamir and George Blakely. Secret sharing takes data and uses randomization to compute different numbers (shares) that only together define the secret/data, meaning it’s almost impossible for hackers to piece together.
Secret sharing is mathematically unbreakable, and is so strong in its inherent security methodology that it has been used to prevent accidental or malicious launch of nuclear weapons.

Why is it safer than other methods?

It’s safer because it’s information that’s theoretically secure. For example, there’s not enough information to solve A + B = 100. You’re presenting the hacker with a problem that they don’t have enough information to solve. This enables the implementation of multi-layer cyber security, where each hacking breakthrough merely yields a useless piece of information.
Secret sharing prevents accidental launch of nuclear weapons.
Secret sharing prevents accidental launch of nuclear weapons. Source: YouTube

Where was it used to help prevent accidental or malicious launch of nuclear weapons?

In secret sharing, a secret is transformed into several meaningless ‘shares’ where several – or all – of them are needed in order to reconstruct the secret. This mathematical concept is often used as a security measure taken to prevent single-person access to secured environments. For example, the US Air Force is operating under “The Two-Person Concept” directive which is designed to prevent accidental or malicious launch of nuclear weapons by a single individual.

Is the method expected to overtake others in the future?

We believe that single-point-of-failure security is a thing of the past. The only way to ensure long and everlasting security is by applying secret sharing-based security to Mobile cloud and Internet of Things (IoT) environments.

The end of the password?

The Secret Double Octopus website declares that “the password is dead.” The company believes that: “No password security means more protection, not less”, because “in the hands of users, passwords are a vulnerability”, and that “password-based security is a poor fit for fast-growing architectures, such as cloud, mobile, and IoT. There’s too much to remember – too much complication and exposure.” The alternative, they believe, is an “authentication wall is invisible to the user. There are security factors, but the user does not need to remember or operate” them. Instead, the company creates “a password-free environment with trust channels established via a mobile phone app.” It’s certainly true that passwords are far from ideal, and an eventual move away from them is almost inevitable. The use of secret sharing on a widespread basis, including by the majority of individuals, is a direction in which cyber-security could and perhaps should evolve.  
  Source: https://techdigg.com/2017/07/21/secret-sharing-protects-nuclear-weapons-and-could-replace-our-passwords/
0

Azlan strengthens security offering with specialist solution for keyless authentication technology Barcelona, Spain, 29 June 2017:

Tech Data Corporation (Nasdaq: TECD) today announced that Azlan, Tech Data Europe’s specialist brand for the value-added distribution of enterprise networking, server, storage and software solutions, today announced a pan-EMEA distribution agreement with  Secret Double Octopus, a pioneer of keyless multi-shield authentication technology.   Secret Double Octopus has developed a solution for the market that applies keyless authentication and identity protection for cloud, mobile, and IoT solutions.

Secret Double Octopus’ app helps companies to scale their network security and shift away from key-based authenticators, to a more secure keyless solution. With one tap, the authenticator app initiates a multi-shield authentication process for users in order to verify or reject the login attempt, payment or transaction. David Harvey, director, Security and Enterprise Networking Solutions at Azlan, says “By bringing Secret Double Octopus into our vendor portfolio, Azlan enriches its security offering with an innovative solution that addresses customers’ authentication challenges, is scalable and easy to deploy, and helps provide cost-effective security.” “For years, organizations have sought to educate employees about the importance of secure passwords and resisting phishing attacks, both of which have failed. It is time to replace the password.” said Raz Rafaeli, CEO of Secret Double Octopus. “We are excited to expand our global footprint through this partnership with Azlan. We can offer the European market a strong authentication solution that will eliminate the need for passwords – a security vulnerability that accounts for two-thirds of data breaches.”   About Tech Data Tech Data Corporation is one of the world’s largest wholesale distributors of technology products, services and solutions. Its advanced logistics capabilities and value-added services enable 115,000 resellers to efficiently and cost-effectively support the diverse technology needs of end users in more than 100 countries. Tech Data generated $26.2 billion in net sales for the fiscal year ended January 31, 2017. It is ranked No. 107 on the Fortune 500® and one of Fortune’s “World’s Most Admired Companies.” To learn more, visit www.techdata.com, or follow us on Facebook and Twitter.  About Secret Double Octopus Secret Double Octopus is the world’s only password-free, keyless authentication technology to protect identity and data across cloud, mobile and IoT environments. Based on Secret Sharing algorithms, originally developed to protect nuclear launch codes, Secret Double Octopus’ technology prevents cyber attackers from accessing enough critical information to be useful for attacks, eliminating brute force, man-in-the-middle, PKI manipulation, key theft and certificate authority weaknesses. The Company was founded in 2015 by a seasoned leadership team with more than 100 years combined academic and industry experience. Secret Double Octopus is backed by Jerusalem Venture Partners, Iris Capital, Liberty Media and Benhamou Global Ventures. To learn more, visit www.doubleoctopus.com, or follow us on Facebook and Twitter.   
Source: http://www.ts.avnet.com/emea/press_centre/press_centre_more/11680/tech_data_europe_announces_new_distribution_agreement_with_secret_double_octopus.html
0

New Investments, Fresh Capital, Recent Exits, Mark Momentum for Benhamou Global Ventures PALO ALTO, CA –(Marketwired – June 28, 2017) – Benhamou Global Ventures (BGV), an early-stage venture capital firm with deep Silicon Valley roots and an exclusive focus on enterprise information technology opportunities in global markets, announced the final close of their third fund with $80 million of investable capital. Investors in the third fund include both existing LPs as well as new international and institutional LPs including several US, European, Israeli and Chinese investors. Extending the strategy of fund BGV II, BGV III will focus on enterprise IT sectors including cyber security, cloud-based infrastructure services and applications, web scale infrastructure, advanced analytics and artificial intelligence as well as industrial Internet of Things (IOT). The firm will continue its cross-border investment strategy, identifying and investing in promising companies originated in Israel, Europe and Asia and helping them build a presence in Silicon Valley. BGV has made 5 investments from the BGV III fund recently: Bayshore Networks, an emerging leader in Industrial IOT cyber security was completed in March 2017 and was syndicated with Trident Capital. The company secures and protects critical Industrial IOT assets. Secret Double Octopus (SDO) is an Israeli cyber security company whose breakthrough technology enables a password-free environment with trust channels established via a mobile phone app. That investment was completed in April 2017 and was syndicated with JVP, Iris Capital, and Liberty Media Ventures. Sherpa Digital Media, an emerging leader in Augmented Reality for the enterprise, was completed in June 2017 and was syndicated with Rally Ventures. The company securely manages, measures and automates video content and reaches customers, prospects and employees across all devices and locations. 6d bytes, an emerging leader in robotics, machine vision and AI, was completed in June 2017 and was syndicated with Partech and leading angel investors such as Plug and Play. The company is transforming the way the food and beverage industry approaches the preparation and serving of healthy foods. Drishti, a computer vision spin-off of SRI (Stanford Research Institute, Menlo Park) joined the BGV portfolio in June 2017 and was syndicated with Andreessen Horowitz (a16z). It provides a highly innovative solution to improve the efficiency of human operators in manufacturing assembly lines. “We are grateful to enjoy the support of exceptional repeat and new investors in fund III to implement our investment strategy,” said Eric Benhamou, founder and general partner of Benhamou Global Ventures. “The sales of Grid Dynamics (acquired by TeamSun) and of Zentri (acquired by Silicon Labs) in Q1 2017 are a further evidence of the success of the BGV model.” The partners of BGV III are Eric Benhamou, Anik Bose, Eric Buatois, Yashwanth Hemaraj, Marina Levinson, Amir Nayyerhabibi, Janice Roberts based in BGV’s Palo Alto office, and Barak Ben Avinoam (based in BGV’s Tel Aviv office in Israel). About Benhamou Global Ventures BGV is an early-stage venture capital firm with deep Silicon Valley roots, with an exclusive focus on enterprise technology opportunities in global markets. BGV currently has 25 active companies in its portfolio. The BGV team of 8 investment professionals has successfully built and implemented a cross-border venture-investing model with companies from Israel, Europe and Asia. Eric Benhamou, former chairman and CEO of 3Com, Palm and co-founder of Bridge Communications, founded the firm in 2004. Comprised of an experienced partnership team of global operating executives and investors, BGV is often the first and most active institutional investor in a company and has a powerful network of technical advisors, executives and functional experts who actively engage with its portfolio companies. The company has offices in Palo Alto, California and Tel Aviv, Israel. For more information, visit www.benhamouglobalventures.com.
Source: http://www.marketwired.com/press-release/bgv-closes-third-fund-makes-new-investments-2224138.htm
0

Israel continues to produce an impressive number of highly successful tech companies for a country with a population of just 9 million people. The Middle Eastern country is sometimes referred to as “Startup Nation” thanks to the sheer number of entrepreneurs building businesses there, particularly in cities like Tel Aviv. Multinational tech companies like Google, Apple, Facebook, and Microsoft all have research centres in Israel but some of the local companies are arguably more interesting, with many of them specialising in drones, cybersecurity, and autonomous driving technology. Take Mobileye, for example. The company’s autonomous driving technology was so interesting that Intel paid a whopping $15.3 billion (£11.8 billion) for it in March when it acquired the company. The tech companies have been ranked based on interviews with multiple investors on the ground in Israel and what the firms have achieved over the last year.  
 

14. Secret Double Octopus — password elimination service

14. Secret Double Octopus — password elimination service
Secret Double Octopus
Despite its rather peculiar name, Secret Double Octopus has a credible mission: to eliminate passwords from our daily lives. The company’s app allows people to use their smartphones to authenticate that they are who they say they are. Instead of typing a password, which can be forgotten, phished, or compromised, users simply tap a push notification that’s sent to their phone when they try and access an account. Secret Double Octopus announced it had received $6 million (£4.2 million) from investors in January and it launched a new authenticator app for businesses called “Octopus Authenticator” in March.   Source, full article: http://www.businessinsider.com/coolest-tech-startups-in-israel-2017-5/#15-dapulse-team-management-and-productivity-platform-11
0