Facebook Icon Facebook Icon Twitter Icon Twitter Icon Linkedin Icon Linkedin Icon Blog Icon Blog Icon Checkmark Icon Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Clock Icon Clock Icon Cloud Icon Cloud Icon Cloud Upload Icon Cloud Upload Icon Compass Icon Compass Icon Medium count 1 Icon Medium count 1 Icon Medium count 2 Icon Medium count 2 Icon Medium count 3 Icon Medium count 3 Icon Medium count 4 Icon Medium count 4 Icon Medium count 5 Icon Medium count 5 Icon Medium count 6 Icon Medium count 6 Icon Medium count 7 Icon Medium count 7 Icon Medium count 8 Icon Medium count 8 Icon Medium count 9 Icon Medium count 9 Icon Medium count 10 Icon Medium count 10 Icon Medium count 11 Icon Medium count 11 Icon Medium count 12 Icon Medium count 12 Icon Medium count 13 Icon Medium count 13 Icon Medium count 14 Icon Medium count 14 Icon Medium count 15 Icon Medium count 15 Icon Device with a checkmark Icon Device with a checkmark Icon Device Icon Device Icon Documentation Icon Documentation Icon Dollar Sign Icon Dollar Sign Icon Extend Icon Extend Icon Eye Icon Eye Icon Gear Icon Gear Icon Globe Icon Globe Icon Graph Icon Graph Icon Guidelines Icon Guidelines Icon Laptop Icon Laptop Icon Layers with checkmark Icon Layers with checkmark Icon Key Icon Key Icon Lock Icon Lock Icon Paper Airplane Icon Paper Airplane Icon Pencil Icon Pencil Icon Phone Icon Phone Icon Reliability Icon Reliability Icon Reset Icon Reset Icon Shield with Checkmark Icon Shield with Checkmark Icon Timer Icon Timer Icon Tools Icon Tools Icon Tutorial Icon Tutorial Icon Upload Icon Upload Icon User with Checkmark Icon User with Checkmark Icon User Icon User Icon Wallet Icon Wallet Icon Case Study Icon Case Study Icon Video Icon Video Icon White Paper Icon White Paper Icon

Every once in awhile an Authy user loves us and leaves us, only to find the grass is not always greener on the other side. This is @Telomir’s story: Authy:…

Read More

Authy OneTouch is the easiest 2FA solution today; users love it! Before OneTouch, two-factor authentication was a drag, and users complained. Security officers compromised security with usability by only requiring…

Read More

When people talk about mobile-first, they usually aren’t thinking ‘security first.’ But they should be. Building any new application or service today—especially when considering the international market for mobile-first apps,…

Read More

Back in February, Twilio announced that VMware will offer Authy 2FA for VMware’s Identity Manager™, an identity management solution that delivers on consumer-grade expectations with one-touch access to nearly any…

Read More

Note: Signal 2016 will be held in San Francisco on May 24-25. And the after party, $BASH, happens on the 25th. It’ll be the biggest, nerdiest space carnival you have…

Read More

The countdown for Collision 2016 has officially begun. Here’s why we’re excited: The Move: This is the first year that Collision, the U.S. version of the popular Web Summit started…

Read More

The last three months, Authy has been everywhere. We went to: Austin for SXSW Barcelona, Spain for the Mobile World Congress Las Vegas for InterConnect2016 Linz, Austria for TopConf_Linz London,…

Read More

Hi, my name is Severine, the new marketing manager at Authy. A little about me: I’m not a developer I have a basic understanding of how the Internet works, but…

Read More

Adding a security layer to merge pull requests is easy to implement using cloud platforms like Authy. In just a few hours I was able to set up the entire…

Read More

It’s great to see the reactions of people when we show them Authy OneTouch. The speed and simplicity of Authy OneTouch are perfect for those times where using tokens are too…

Read More

I was recently interviewed by Andres Gonzalez and Alex Eaton on the B Libre! Podcast, which focuses on decentralized technologies and all things Bitcoin. It was a fun interview, and…

Read More

I had hoped to grab some time immediately after the 2016 Mobile World Congress (MWC) to jot down my impressions, but my head was reeling with all the innovation, ideas…

Read More

People are usually of one of two camps when you mention graffiti. Some consider it to be synonymous with vandalism and property destruction. Others see it as a unique form…

Read More

Authy often takes what we’ve learned about digital security and user authentication to provide valuable insights that you can apply to your own websites, interactive tools, and apps. That’s why…

Read More

Not long ago Authy was a small start-up with a big vision: to bring strong and easy-to-implement, two-factor authentication to web and mobile developers everywhere. When we started there were…

Read More

I have to say how wonderful it feels to be a part of the Authy team at Twilio. And here’s why: I was recently on stage presenting Authy solutions at…

Read More

This post originally appeared on the Twilio blog Passwords aren’t enough anymore. Keeping user data safe is hard enough without users themselves choosing the worst passwords in the world. Yes,…

Read More

On January 13, 2016, Authy engineers identified an insecure access policy on a datastore serving an administrative application. The access policy made the datastore readable and writable by anonymous users…

Read More

So far in 2016 we’ve been jetting about and evangelizing 2FA all over the world, from Miami for The North American Bitcoin Conference and to Finovate Europe in London just…

Read More

All this week we’ll be giving away a free pass or two to The 4th annual North American Bitcoin Conference (TNABC), in Miami, Florida. The conference is on January 21 &…

Read More

Summary of notice: Routine security testing revealed a vulnerability unrelated to authentication The vulnerability had potential to expose data for a small number of users (<0.2%) We proactively issued a…

Read More

When BitcoinBlackFriday — the cryptocurrency cousin of the biggest retail shopping day ever — first started a few years back, it was scheduled for a few weeks before Thanksgiving. There…

Read More

In October I had the pleasure of heading across town to GamesBeat 2015, a brilliant conference initiated by VentureBeat, considered one of the ‘best blogs on the web’ by The…

Read More

Recently I had the opportunity to jet westward to attend the FinDevr conference in San Francisco, a great excuse for what is basically two days of geeking out with other…

Read More

Today is an exciting day at Authy. Twitch, the leading streaming service in gaming and entertainment, has just rolled out two-factor authentication (2FA) to provide increased security for all of…

Read More

Although not as well known—or as boozy—as Oktoberfest, National Cyber Security Awareness Month (NCSAM) is soon coming to a close. Jointly assembled by the National Cyber Security Alliance, the FIDO…

Read More

Hey Authy Customers, As you know, in February of this year Authy was officially acquired by Twilio to help bring security to every corner of the internet. With Twilio’s goal…

Read More

Authy this week has moved the needle forward in regards to providing better security for users, and the applications they use online. We have announced the public release of OneTouch,…

Read More

Last week, an independent security researcher disclosed a new OpenSSH bug that allows attackers to easily brute-force SSH passwords. Worse, this vulnerability affects OpenSSH versions going back to a version…

Read More

Authy Customer We have important news regarding next steps in our integration with Twilio. In the next month we will be transitioning our billing from Authy’s system to Twilio’s and…

Read More

The world today is on the move. People, things, everything. Houses know when you are coming home, cars drive themselves, and the Internet of Things is happening today, with 2FA…

Read More

Two months have passed since we joined forces with Twilio and rather than slowing us down, things are accelerating at Authy – in ways all great for us and for…

Read More

Egor Homakov, an independent security researcher from Sakurity, responsibly disclosed a “Format Injection” vulnerability that affected the Authy service through a commonly used open source library. Through the Authy security…

Read More

Today I am super excited to announce that Authy is becoming a part of Twilio. This might come as a surprise as we announced our last round of funding just a…

Read More

This month, we’ve reached a huge milestone: we’ve hit one million (and growing) unique users using Authy for Two-Factor Authentication! Back in 2012, when we started Authy we had less…

Read More

Authy lets you use “something you know” paired with “something you have” to log in securely into your accounts using two-factor authentication. Up until now, however, what you “have” was…

Read More

Last Monday, Heartbleed, which is perhaps the worst vulnerability in recent history, was disclosed. The vulnerability was present in OpenSSL for 2 years (since March 2012) and it was discovered…

Read More

This is a quick alert. Over the past few months we’ve seen a large amount of accounts being compromised on several of our clients sites. All of them had Two-Factor…

Read More

Last week, Lean Stack did a published a great interview where we talked in-depth how we built our infrastructure. Our primary goal when designing our infrastructure was uptime. Other big…

Read More

Multi-Factor Authentication, where you present “something you know” paired with “something you have” has been around for decades. Yes, it hasn’t changed much. What has changed dramatically is what “you…

Read More

This past couple of days we’ve watched in awe how a number of services had been compromised. It all started with some random SPAM messages appearing on several Facebook accounts….

Read More

Today we came to the conclusion that is time to retire the BlackBerry Authy App. Although our initial strategy was to support as many platforms as possible, we’ve come to…

Read More

Yesterday Google Authenticator released an update for their iPhone App that wiped users keys when installed. That prompted a lot of users to switch to Authy and use our key…

Read More

Two-Factor Authentication became mainstream in the past year. People finally realized that passwords alone are not enough and demanded something better. Services responded: Google, Dropbox, Twitter, Linked-in and the majority…

Read More

Non-repudiation in IT security means being able to prove where something comes from or who did what. Although few people talk about it, it’s actually an essential part of a lot…

Read More

Last week a large distributed brute-force attack was launched against WordPress Blogs. One of the first to notice the attack was CloudFlare. Not only did they detect the attack, they…

Read More

Last week we released a WordPress Plugin for Authy. A few hours after the launch we were informed by Jon Oberheide from Duo Security that our WordPress plugin contained a…

Read More

As we’ve grown it’s been increasingly important we maintain transparency and security. We want to make it clear and easy for anyone to report security issues to us. Today we’re…

Read More

WordPress has made it easy for anyone to create and maintain a great site. It’s so powerful that even some of the biggest site’s on the web like forbes.com use…

Read More

Since we launched Authy one of the most common concerns is that no one wants to install a new app for every Two-Factor Authentication account. We built Authy to be the…

Read More

We just updated our website, our pricing and our blog. First we cleaned up our index page and our demo to make them easier to understand/navigate. But perhaps the biggest…

Read More

We love SSH here at Authy. We use it for practically everything: git, remote shell’s access, deployment scripts and even pair programming. Installation. $ curl ‘https://raw.github.com/authy/authy-ssh/master/authy-ssh’ -o authy-ssh $ sudo…

Read More

More than a year ago I started working on an Android App to add two-factor authentication to a site I was working on. Since then Authy has changed dramatically to…

Read More