Try our new research platform with insights from 80,000+ expert users

Twilio discloses a data breach. What could be done better to prevent it in the future?

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 2
  • 34
PeerSpot user

2 Answers

Last answered Aug 5, 2025
HatemAly - PeerSpot reviewer
Presales Manager at 1D Consulting
Real User
Top 5
Aug 5, 2025
Search for a product comparison in Identity Management (IM)
LN
IDM Engineer at a tech services company with 51-200 employees
Real User
Aug 10, 2022
EB
Director of Community at PeerSpot (formerly IT Central Station)
Real User
Aug 10, 2022

@Ladislav Nyiri thanks for your answer. It seems that your suggested 2 recommendations of: 
(1) security awareness training/education and 
(2) OTP 
could already significantly decrease the risks of this security incident.  

PeerSpot user
Find out what your peers are saying about SailPoint, Microsoft, One Identity and others in Identity Management (IM). Updated: January 2026.
881,821 professionals have used our research since 2012.
Access Management
Access Management solutions provide security and control for managing user identities and permissions within systems. The tools facilitate the authentication and authorization processes, ensuring that the right individuals have access to the appropriate resources.Effective Access Management is crucial for ensuring secure and efficient control over who can access company resources. It supports compliance with regulatory requirements, minimizes the risk of unauthorized access, and enhances...
Download Access Management ReportRead more

Related Q&As