GitHub will begin its official rollout of two-factor authentication for developers who contribute code on the platform, starting March 13. GitHub added that it will support SMS text messages as a second factor, while testing FIDO Alliance passkeys internally to improve the security posture. “It is true that SMS 2FA can be easily phished by hackers as it relies on knowledge-based credentials. But GitHub recognizes these risks and strongly recommends using security keys and TOTPS wherever possible for greater security – [and] will continue to offer SMS for 2FA – which is better than removing the option entirely,” said Andrew Shikiar, executive director of the FIDO Alliance.


More

Biometric Update: Biometrics connecting ID and payments through digital wallets, apps and passkeys

Biometrics are connecting with payment credentials, whether through numberless credit cards and banking apps or…

Read More →

CPO Magazine: Passkey Authentication and Its Relevant Authentication Standards

Passkey authentication replaces traditional passwords with a pair of cryptographic keys—public and private. The private key…

Read More →

HealthcareIT: Passwords Are the Problem: How More Secure Authentication Methods Can Transform Healthcare Workflows

Username and password authentication is a fixture in healthcare but one that continues to hinder…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.