Facebook Icon Facebook Icon Twitter Icon Twitter Icon Linkedin Icon Linkedin Icon Blog Icon Blog Icon Checkmark Icon Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Clock Icon Clock Icon Cloud Icon Cloud Icon Cloud Upload Icon Cloud Upload Icon Compass Icon Compass Icon Medium count 1 Icon Medium count 1 Icon Medium count 2 Icon Medium count 2 Icon Medium count 3 Icon Medium count 3 Icon Medium count 4 Icon Medium count 4 Icon Medium count 5 Icon Medium count 5 Icon Medium count 6 Icon Medium count 6 Icon Medium count 7 Icon Medium count 7 Icon Medium count 8 Icon Medium count 8 Icon Medium count 9 Icon Medium count 9 Icon Medium count 10 Icon Medium count 10 Icon Medium count 11 Icon Medium count 11 Icon Medium count 12 Icon Medium count 12 Icon Medium count 13 Icon Medium count 13 Icon Medium count 14 Icon Medium count 14 Icon Medium count 15 Icon Medium count 15 Icon Device with a checkmark Icon Device with a checkmark Icon Device Icon Device Icon Documentation Icon Documentation Icon Dollar Sign Icon Dollar Sign Icon Extend Icon Extend Icon Eye Icon Eye Icon Gear Icon Gear Icon Globe Icon Globe Icon Graph Icon Graph Icon Guidelines Icon Guidelines Icon Laptop Icon Laptop Icon Layers with checkmark Icon Layers with checkmark Icon Key Icon Key Icon Lock Icon Lock Icon Paper Airplane Icon Paper Airplane Icon Pencil Icon Pencil Icon Phone Icon Phone Icon Reliability Icon Reliability Icon Reset Icon Reset Icon Shield with Checkmark Icon Shield with Checkmark Icon Timer Icon Timer Icon Tools Icon Tools Icon Tutorial Icon Tutorial Icon Upload Icon Upload Icon User with Checkmark Icon User with Checkmark Icon User Icon User Icon Wallet Icon Wallet Icon Case Study Icon Case Study Icon Video Icon Video Icon Webinar Icon Webinar Icon White Paper Icon White Paper Icon

Protecting The Front Door To Your App: The Login

This is the first article in the 3-part series: App Security: To Build or To Buy?  When building any software application, making it secure is a top priority. But security…

Multi Multi-Factor Authentication

Multi-Factor Authentication, where you present “something you know” paired with “something you have.” has been around for decades. Yes, it hasn’t changed much. What has changed dramatically is the what…

Spend One Day: Enable 2FA On Your VPN

Over the past few years we have watched in awe as site after site have fallen to hackers. From Yahoo’s huge 500MM compromised accounts to LinkedIn and Adobe’s major data…

AUTHY USER: SECURITY IN PARADISE

Even in paradise you need a little extra security. This is @StefanyBaez’s story: Authy: Tell us a little about yourself. Stefany: My name is Stefany Baez, I was born and…

How the Authy Two-Factor Backups Work

A few years ago Google Authenticator released an update for their iPhone App that wiped users 2FA keys when installed. That prompted a lot of users to switch to Authy…

MORE AUTHY INNOVATION: ONETOUCH NOW ON DESKTOP

The Future Of Authentication Most authentication across the web is reliant on a username and password pair, a security strategy that’s decades old and out of date. Two-factor authentication (2FA)…

Push your account security into the modern age: two-factor authentication

The need for two-factor authentication is growing, especially following the warning from the Payment Card Industry Security Standards Council that UK businesses could face up to £122 billion in penalties…

Quick and Easy 2FA: Adding Authy to a NodeJS App

When first discussing Authy with potential customers, one of my favorite points of discussion is how easy it is to add our product to a pre-existing infrastructure.  Typically we see…

Shopping & Security On CyberMonday

Shopping on Black Friday, the day after Thanksgiving, can be chaotic and downright scary. The following day, Small Business Saturday, is worthwhile but may not yield big savings. No wonder…

¿Qué es BOGOTA TECH TALKS?

With the Bogotá Tech Talks Meetups being very popular in our office in Colombia, we decided to delve in a bit more to better understand what makes Bogota tick: We spoke…