GitHub will begin its official rollout of two-factor authentication for developers who contribute code on the platform, starting March 13. GitHub added that it will support SMS text messages as a second factor, while testing FIDO Alliance passkeys internally to improve the security posture. “It is true that SMS 2FA can be easily phished by hackers as it relies on knowledge-based credentials. But GitHub recognizes these risks and strongly recommends using security keys and TOTPS wherever possible for greater security – [and] will continue to offer SMS for 2FA – which is better than removing the option entirely,” said Andrew Shikiar, executive director of the FIDO Alliance.


More

Dark Reading: Farewell, Dear Password? The Future of Identity and Authorization

Many organizations are considering trading out passwords for stronger authentication solutions, and FIDO Authentication is…

Read More →

Fast Company: Yubico’s tiny YubiKey has the future of security all locked up

FIDO standards and FIDO Security Keys turn conventional two-factor authentication on its head and are…

Read More →

Brian Madden: How does FIDO work on non-certified devices (Apple devices)?

FIDO is the “hot thing” in identity and access management in 2019, and there are…

Read More →