Cybersecurity Articles

Sorted By: Most Recent
Tammy Xu Tammy Xu
Updated on July 26, 2022

Thinking of Transitioning to Zero-Trust Security? Here’s What to Consider.

Zero-trust security can be great for new systems, but retrofitting old systems may be more of a challenge.

Tammy Xu Tammy Xu
Updated on July 20, 2022

Bug Bounties: An Overview

Some things to consider before getting in on the action.

Dilan Sachintha Nayanajith Dilan Sachintha Nayanajith
Updated on July 18, 2022

Node.js App Security: Let No One Through the (Digital) Gates

An overview of the most common security issues unique to Node.js and their countermeasures.

Arash Afshar Cassandra Heart Arash Afshar Cassandra Heart
Updated on July 11, 2022

Threshold Digital Signatures: How to Keep Your Crypto Secure

Threshold digital signatures keep your crypto safer than ever. Here’s how they work.

Tammy Xu Tammy Xu
Updated on April 06, 2022

10 Security Conferences for Software Developers

Whether you’re looking for security training or a hacker experience, there’s a conference here for you.

Updated on November 19, 2021

Data Science Is a Key Weapon in the Fight Against Fraud

Only big data technology can monitor vast systems at scale.

Tatum Hunter Tatum Hunter
Updated on July 09, 2021

Finding (and Fixing) Open-Source Software Vulnerabilities in Your Code

Odds are, your codebase contains open-source components. Are you keeping up with their security?

Tammy Xu Tammy Xu
Updated on July 08, 2021

13 Best Practices for Improving Web Application Security

Here’s what you need to know to get started.

Tammy Xu Tammy Xu
Updated on July 08, 2021

How Developers and Cybersecurity Teams Can Improve Communication

We spoke with three cybersecurity experts about streamlining collaboration between developers and security teams.

Stephen Gossett Stephen Gossett
Updated on May 22, 2021

What Is Differential Privacy? Can ‘Noisy’ Data Help Add Anonymity to Public Data Sets?

The census and COVID exposure trackers rely on deliberately noisy data as a privacy measure. Here’s how it works.