Cybersecurity Articles

Sorted By: Most Recent
Parag Radke Parag Radke
Updated on February 15, 2023

Mutual TLS: A Tutorial

Mutual transport layer security (mTLS) is an end-to-end security method for mutual authentication that ensures that both parties are who they claim to be before data is shared. Here’s what you need to know.

Image: Shutterstock / Built In
Estefanía García Gallardo Estefanía García Gallardo
Updated on January 17, 2023

What Is Intranet?

Intranet are private networks used by organizations to improve secure communication, collaboration and information sharing between authorized users.

Image: Shutterstock / Built In
Stephen Gossett Stephen Gossett
Updated on October 26, 2022

These 11 Startups Are Working on Data Privacy in Machine Learning

Techniques like federated learning and differential privacy are maturing — and attracting significant VC investment.

Abhinav Singh Abhinav Singh
Updated on September 29, 2022

What Is a Rate Limiter?

A rate limiter is a defensive mechanism used in a distributed system to prevent the frequency of an operation from exceeding a defined limit and causing server errors. Here’s what you need to know.

Image: Shutterstock / Built In
Manav Mital Manav Mital
Updated on August 02, 2022

Which Identity Access Management (IAM) Solution Fits Your Needs?

The answer will be driven by the kind of resource you need to govern.

Tammy Xu Tammy Xu
Updated on July 26, 2022

Multi-Factor Authentication Can Be Pretty Confusing. What Are the Best Options?

MFA implementations should balance ease of use with security.

Tammy Xu Tammy Xu
Updated on July 26, 2022

Thinking of Transitioning to Zero-Trust Security? Here’s What to Consider.

Zero-trust security can be great for new systems, but retrofitting old systems may be more of a challenge.

Tammy Xu Tammy Xu
Updated on July 20, 2022

Bug Bounties: An Overview

Some things to consider before getting in on the action.

Dilan Sachintha Nayanajith Dilan Sachintha Nayanajith
Updated on July 18, 2022

Node.js App Security: Let No One Through the (Digital) Gates

An overview of the most common security issues unique to Node.js and their countermeasures.

Arash Afshar Cassandra Heart Arash Afshar Cassandra Heart
Updated on July 11, 2022

Threshold Digital Signatures: How to Keep Your Crypto Secure

Threshold digital signatures keep your crypto safer than ever. Here’s how they work.