Facebook Icon Facebook Icon Twitter Icon Twitter Icon Linkedin Icon Linkedin Icon Blog Icon Blog Icon Checkmark Icon Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Clock Icon Clock Icon Cloud Icon Cloud Icon Cloud Upload Icon Cloud Upload Icon Compass Icon Compass Icon Medium count 1 Icon Medium count 1 Icon Medium count 2 Icon Medium count 2 Icon Medium count 3 Icon Medium count 3 Icon Medium count 4 Icon Medium count 4 Icon Medium count 5 Icon Medium count 5 Icon Medium count 6 Icon Medium count 6 Icon Medium count 7 Icon Medium count 7 Icon Medium count 8 Icon Medium count 8 Icon Medium count 9 Icon Medium count 9 Icon Medium count 10 Icon Medium count 10 Icon Medium count 11 Icon Medium count 11 Icon Medium count 12 Icon Medium count 12 Icon Medium count 13 Icon Medium count 13 Icon Medium count 14 Icon Medium count 14 Icon Medium count 15 Icon Medium count 15 Icon Device with a checkmark Icon Device with a checkmark Icon Device Icon Device Icon Documentation Icon Documentation Icon Dollar Sign Icon Dollar Sign Icon Extend Icon Extend Icon Eye Icon Eye Icon Gear Icon Gear Icon Globe Icon Globe Icon Graph Icon Graph Icon Guidelines Icon Guidelines Icon Laptop Icon Laptop Icon Layers with checkmark Icon Layers with checkmark Icon Key Icon Key Icon Lock Icon Lock Icon Paper Airplane Icon Paper Airplane Icon Pencil Icon Pencil Icon Phone Icon Phone Icon Reliability Icon Reliability Icon Reset Icon Reset Icon Shield with Checkmark Icon Shield with Checkmark Icon Timer Icon Timer Icon Tools Icon Tools Icon Tutorial Icon Tutorial Icon Upload Icon Upload Icon User with Checkmark Icon User with Checkmark Icon User Icon User Icon Wallet Icon Wallet Icon Case Study Icon Case Study Icon Video Icon Video Icon Webinar Icon Webinar Icon White Paper Icon White Paper Icon

Even Strong Passwords Don’t Cut It for Bank Payment Systems

When black market criminals use tighter security than global payment systems, you know the banking industry needs to wake up. Two-factor authentication (2FA) is now a standard practice on the…

Google Prompt confirms future of 2FA and authentication technologies

In order to strengthen security for all of its users, Google recently announced Google Prompt, a significant improvement in how they authenticate users. Google Prompt is a push notification solution…

AUTHY USER: WHEN THE BOSS MAKES YOU SWITCH 2FA APPS

Every once in a while an Authy user loves us and leaves us, only to find that the grass is not always greener on the other side. This is @markjgardner‘s story….

Security of SMS for 2FA. What are your options?

Two-factor authentication is about using something in addition to your username and password for authentication. That “something” falls into three main categories, something you know (i.e. your social security number),…

Authy WordPress plugin now supports OneTouch

The future of authentication is using a combination of push notifications combined with a simple and rich user experience on a mobile device. To users, this would appear as a…

SECURITY NOTICE: Vulnerability for Authy plugin for WordPress 4.5

Details In April of 2016, WordPress released version 4.5 and introduced a new feature whereby you can login with both the username and the email. In previous versions it was…

Real Time Rails 4: Using Server-Sent Events with Authy OneTouch

Server-Sent Events (SSE) are real-time events sent from a server and received by a browser, perfect for updating the front end when a server receives a webhook. We’re going to look…

Want to know your customer? Try authenticating them.

Customer demands are increasing and changing at a rapid rate, forcing companies to adopt new technologies that scale with their business needs– especially security. In the early days of online…

PEOPLE OF AUTHY: JOSH STAPLES

The people who work at Authy are as diverse as the jobs they do. There are Authy originals who were part of the team when Twilio acquired the company back…

Webinar: Buy vs. Build: How SendGrid implemented 2FA using Authy

Building any new application or service today requires a laser focus on security. Relying solely on a username and password is like fitting a propeller engine on the latest Boeing…