Oct 26, 2018 | Articles, Security
Tech insiders have varied opinions when it comes to making the definitive determination if two-step verification is helpful or a hindrance in business. Two-step verification, through authentication apps and similar software programs, provides an extra layer of...
Feb 24, 2017 | Articles, News
While working on something completely unrelated, Google security researcher, Tavis Ormandy, recently discovered that Cloudflare was leaking a broad range of sensitive information, which could have included everything from cookies and tokens, to credentials. Cloudflare...