<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: NasimSulaiman</title>
    <description>The latest articles on DEV Community by NasimSulaiman (@nasimsulaiman).</description>
    <link>https://dev.to/nasimsulaiman</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F429071%2Fe5cf882d-ab72-43a5-92d8-bb522c2bc5dd.png</url>
      <title>DEV Community: NasimSulaiman</title>
      <link>https://dev.to/nasimsulaiman</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/nasimsulaiman"/>
    <language>en</language>
    <item>
      <title>Two-factor authentication: How Beagle Security handles 2FA security testing</title>
      <dc:creator>NasimSulaiman</dc:creator>
      <pubDate>Wed, 18 May 2022 06:41:37 +0000</pubDate>
      <link>https://dev.to/nasimsulaiman/two-factor-authentication-how-beagle-security-handles-2fa-security-testing-3bl8</link>
      <guid>https://dev.to/nasimsulaiman/two-factor-authentication-how-beagle-security-handles-2fa-security-testing-3bl8</guid>
      <description>&lt;p&gt;2 FA plays an important role in securing our data against online attacks as an extra security layer, and users should be adopting it for their applications. &lt;br&gt;
There are many methods of two factor authentication available, all of which have a common goal: make it harder for a cyber criminal to get access to an account.&lt;br&gt;
Thinking of the requirement, depending on a third-party application did not seem to fit our use case at Beagle Security.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;With thorough research, we at Beagle Security decided to develop a device for 2FA purpose and we have achieved our goal with AI and IOT.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;As a cyber security company, our approach to handling a two-factor authenticated application’s security testing is to gain access to a user’s account with their permission and find the hidden vulnerabilities in it by combining the usage of IoT, AWS cloud and AI.&lt;/p&gt;

&lt;p&gt;See more on how beagle security handles 2FA services &lt;a href="https://beaglesecurity.com/blog/article/how-beagle-security-handles-2fa-security-testing.html"&gt;here&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>aws</category>
      <category>security</category>
    </item>
  </channel>
</rss>
