Google’s Plan for Cybersecurity, Plus Ways to Secure Your Site

While the internet is now weaved into so much of business and life, Google believes it’s time to reinforce security in what they are calling a “watershed moment.” That’s why the search giant is taking steps to remedy the situation. In August, they met at the White House for a cyber security meeting where they…

Pros and Cons of the Most Popular API Authentication Methods

Application Programming Interfaces, or APIs, can handle enormous amounts of data. The type of data can be pretty much anything, such as a product’s information and specifications, a user’s email address and phone number, the credit card used for a transaction, or a person’s social security number. Because APIs are used to handle publicly available…

8 Form Filtering Techniques to Reduce Spam Entries

Nobody likes spam. It is obnoxious, annoying, and a waste of time. Unfortunately, anyone with a website that contains a form has had to deal with it at some point. It doesn’t matter what the form is for—lead generation, customer service or a simple newsletter signup—there will always be spam submissions. In this post we…