Articles

How to Use Two-Factor Authentication in 2021 with Ease

While many people are somewhat confused about “2-factor authentication (2FA)”, which is also known as 2-factor verification, it’s a really easy concept to understand. Think of your bank’s debit card: you insert the card into an ATM, but you’re unable to withdraw or deposit money until you complete the second step – entering your PIN […]

Tech Articles

Mitigations for Common Web Application Flaws

The most prominent components of web applications that intruders will first seek to exploit are vulnerabilities within the web platform. The web platform commonly includes: Web server software (such as IIS or Apache). Extensions to the web server, such as ISAPI filters and extensions, or Apache modules. Dynamic execution environments like ASP.NET, PHP, and J2EE […]