Security engineering is a fast-moving field, and getting left behind is not an option. This ask-me-anything-style Q&A covers compliance frameworks, security checks, and the importance of a DevSecOps approach.
In this ask-me-anything-style Q&A, leading Toptal cybersecurity expert Ilia Tivin responds to colleagues’ questions on AI in cybersecurity and provides data and network protection tips and best practices.
Internet privacy's cutting-edge technology includes encrypted server name indication (ESNI) and encrypted DNS in the form of DNS over HTTPS (DoH). Find out what they are, why they exist, and how they work.
The long-term effect of the Cold War on science and technology is more profound than Nena’s 99 Luftbalons, or any Oliver Stone Vietnam flick. If you are reading this, you’re already using Cold War technology; The Internet. That’s not all. A lot of tech and infrastructure we take for granted was developed, or at least conceived, during these tumultuous decades.
Passwordless authentication has been the Holy Grail of security for years, but progress has been painfully slow. Until a few years ago, the technology to implement passwordless logins on a grand scale simply wasn’t available. However, the industry juggernaut is slowly but surely changing this. There are a few technical, legal and even ethical considerations to take into account, but be as it may, biometric, passwordless authentication is here to stay.
Don't wait for a data breach to happen before making security a priority. This article explains how to set up a proactive web app defense and avoid the top 10 most common security pitfalls.
World-class articles, delivered weekly.
Subscription implies consent to our privacy policy
Thank you!
Check out your inbox to confirm your invite.
Join the Toptal® community.