The Nylas blog

Implementing security by design at startups

Building security by design is crucial, especially for startups and small businesses, where resources are…

Building a security-first culture in your organization

In a time where cyber threats are increasingly sophisticated and frequent, fostering a security-first culture…

Nylas’ Response to the Log4j Vulnerability

At Nylas, our information security team took action to investigate the Log4j vulnerability and found that our codebases were not impacted. As the incident unfolds, see how Nylas responded to identify the impact and protect customer data.

Nylas Provides Enterprise-Grade Reliability Amidst Google’s People API Migration

As APIs expand to the enterprise, they must balance innovation with stability and reduce or eliminate breaking changes.

The Nylas Express Security Review

Simplify and shorten the Google OAuth verification and security assessment through the Nylas dashboard.

Previous1 of 4Next