Cyber Security

Showing 1-3 of 3 results
EngineeringIcon ChevronTechnology

Ask a Cybersecurity Engineer: Trending Questions About AI in Cybersecurity

By Ilia Tivin

In this ask-me-anything-style Q&A, leading Toptal cybersecurity expert Ilia Tivin responds to colleagues’ questions on AI in cybersecurity and provides data and network protection tips and best practices.

5 minute readContinue Reading
EngineeringIcon ChevronBack-end

Keep It Encrypted, Keep It Safe: Working with ESNI, DoH, and DoT

By Brian Wojtczak

Internet privacy's cutting-edge technology includes encrypted server name indication (ESNI) and encrypted DNS in the form of DNS over HTTPS (DoH). Find out what they are, why they exist, and how they work.

11 minute readContinue Reading
EngineeringIcon ChevronBack-end

10 Common Web Security Vulnerabilities

By Gergely Kalman

For all too many companies, it's not until after a breach has occurred that security becomes a priority. An effective approach to IT security must, by definition, be proactive and defensive. This article focuses on avoiding 10 common and significant web-related IT security pitfalls.

10 minute readContinue Reading

Join the Toptal® community.