Tech insiders have varied opinions when it comes to making the definitive determination if two-step verification is helpful or a hindrance in business. Two-step verification, through authentication apps and similar software programs, provides an extra layer of...
While working on something completely unrelated, Google security researcher, Tavis Ormandy, recently discovered that Cloudflare was leaking a broad range of sensitive information, which could have included everything from cookies and tokens, to credentials. Cloudflare...
Subscribe To Our Newsletter
Join our mailing list to receive the latest news and updates from our team.
You have Successfully Subscribed!
We'll NEVER sell, rent or share your email address.