GitHub will begin its official rollout of two-factor authentication for developers who contribute code on the platform, starting March 13. GitHub added that it will support SMS text messages as a second factor, while testing FIDO Alliance passkeys internally to improve the security posture. “It is true that SMS 2FA can be easily phished by hackers as it relies on knowledge-based credentials. But GitHub recognizes these risks and strongly recommends using security keys and TOTPS wherever possible for greater security – [and] will continue to offer SMS for 2FA – which is better than removing the option entirely,” said Andrew Shikiar, executive director of the FIDO Alliance.


More

Fast Company: Yubico’s tiny YubiKey has the future of security all locked up

FIDO standards and FIDO Security Keys turn conventional two-factor authentication on its head and are…

Read More →

Brian Madden: How does FIDO work on non-certified devices (Apple devices)?

FIDO is the “hot thing” in identity and access management in 2019, and there are…

Read More →

InfoSecurity Magazine: Authentication in the Age of GDPR

It’s been over a year since enforcement of the General Data Protection Regulation (GDPR) began,…

Read More →