Cybersecurity Frameworks Articles

Sorted By: Most Recent
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is SQL Injection?

SQL injection is a type of cyberattack that lets a criminal execute their own SQL queries on a database. Here are some examples.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is Smishing?

Smishing is when an attacker uses text messages to trick victims into giving up money, personal information or installing malware. Here’s how you can protect yourself.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on April 22, 2024

The IoT Needs to Enter Its Secure Age Right Now

Experts project a coming explosion in the number of internet-connected devices in circulation. To prepare for that growth, we need to make sure our endpoints are secure.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on April 22, 2024

Why Cybersecurity Needs to Be a Priority in Saas Product Design

Failing to incorporate cybersecurity into the early stages of product design can lead to future data vulnerabilities and breaches. Here’s how to correct that. 

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Zero Trust: What It Is and Important Aspects of It

Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Martin Kuhlmann Martin Kuhlmann
Updated on April 20, 2024

Why Strong Identity Management Matters Now More Than Ever

A rapidly evolving landscape of cyber threats amid economic instability is a recipe for attacks. Our expert explains how identity management is a strong solution.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on April 20, 2024

The Days of Passwords Are Numbered. Is Your Business Ready?

Passwords are no longer up to the task of protecting sophisticated systems from cybercriminal intrusion. Our expert offers guidance on getting ready for what’s coming next.

Image: Shutterstock / Built In
Sascha Giese Sascha Giese
Updated on April 20, 2024

How to Exorcise the Modern Horrors of IT

Your average IT team faces as many shadowy monsters as a camper in a horror movie. Our expert gives you some tools to battle back against them.

Image: Shutterstock / Built In