Real Time Rails 4: Using Server-Sent Events with Authy OneTouch

Server-Sent Events (SSE) are real-time events sent from a server and received by a browser, perfect for updating the front end when a server receives a webhook. We’re going to look at how to use SSE to implement Authy OneTouch using Rails 4. Our end result should look a bit like this: Authy OneTouch Two factor authentication usually means copying a bunch of numbers from your phone to… Read More

Two Factor Authentication in Rails 4 with Devise, Authy and Puppies

Passwords aren’t enough any more. Keeping user data safe is hard enough without users themselves choosing the worst passwords in the world. Yes, “123456” has topped the list of most commonly used password of the year again. Two factor authentication keeps your users’ accounts secure by requiring a second factor of authentication, something a user has (their phone) as well as something they know (their password)…. Read More

Sending Securely: SendSafely Uses Twilio Two Factor Authentication To Ship Files

SendSafelyTFA

Imagine the file you’re emailing to a friend is a physical package with a few bits of sensitive data inside. You could hire a security company to deliver the package, but they’ll need to know what’s inside. You could send it anonymously, but you’ll have no guarantee it arrives safely.  You essentially have two options: security, or privacy. SendSafely Team Lead, Brian Holyfield (pictured right), asked… Read More

Announcing Twilio Two Factor Authentication In The Account Portal

TwoFactorInTheAccountPortal

Security is essential when scaling your business. As you expand your user base, hire, and ship, you become responsible for more and more sensitive information. To keep that information safe, you need the right security tools. Today, we are happy to announce the addition of Two-Factor Authentication as an option when logging into your Twilio account. Here’s how it works. Once you enable Two-Factor Authentication in… Read More

Add Two-Factor Authentication To Your Website with Google Authenticator and Twilio SMS

Since writing this post, we’ve created a new tutorial showing you how to quickly add two-factor authentication to your applications updated with some more recent techniques not highlighted below. Why Two-Factor Authentication? Back in the day, it used to be that enforcing a strong password policy was sufficient to prevent unauthorized access into your user’s accounts. (Ah, those were the days, when kids were polite and respected… Read More

Authy Delivers Two-Factor Authentication Security in Minutes With Twilio SMS

Daniel Palacio decided to found Authy in the spring of 2011 following an onslaught of headline-making password breaches. “People’s accounts were compromised, their e-mails and photos stolen, their social profiles spammed, and their bank accounts drained,” he recalled. As a member of Microsoft’s Windows security team, Palacio knew that the risk of account takeovers was much higher than it needed to be. One simple way to… Read More

Two-Factor Authentication ASP.NET MVC 4 Registration with Twilio SMS

This is a guest post by Long Le, a .NET Enterprise Architect and Solutions Architect at Computer Sciences Corporation. Originally posted on Long’s personal blog found here, Long is an avid blogger and a serious Modern Warfare 3 Gamer. Make sure to follow his code and gaming conversations on Twitter @LeLong37. Some sites such as live.com, gmail.com will require a multi-step registration and/or forgot password workflows… Read More

Gryphn Secure Messaging: SMS Messages Secure Enough for SWAT

Sometimes a text is just a text. But, sometimes a text contains confidential, time sensitive information about Abbeville County, South Carolina’s SWAT team’s rallying point. When you’re worrying about bad guys with guns, you’d rather not dwell on the security of your text message. The three friends who founded the mobile security company Gryphn are working to make texting more secure for the Abbeville SWAT team, and… Read More

CloudPassage Increases Cloud Security With Multi-factor Authentication

One of the unfortunate truths of cloud computing is that major improvements in efficiency and scalability have come at a cost. While cloud computing has made it many times easier to start and run a business, it’s also made it many times more risky. Your business can be attacked by anyone from anywhere, and unless you can find a computer security specialist to help you out,… Read More