As the severity and frequency of online threats continue to multiply so does the efforts to create new and improve existing security protocols. Unfortunately, for every new solution a counter threat appears making this an expensive and urgent race to come up with new...