All Articles

Sorted By: Most Recent
Martin Kuhlmann Martin Kuhlmann
Updated on April 20, 2024

Why Strong Identity Management Matters Now More Than Ever

A rapidly evolving landscape of cyber threats amid economic instability is a recipe for attacks. Our expert explains how identity management is a strong solution.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

To Stop Future Hacks, Look to the Past

Every new technology comes with new vulnerabilities. In many cases, however, cybersecurity experts can learn from hacks of the past to close security gaps in the future.

Folake Dosu Folake Dosu
Updated on April 20, 2024

State Department seeks to reestablish cybersecurity bureau

The State Department recently set a plan to Congress to re-establish a cybersecurity-focused bureau nixed under Former Secretary Tillerson.

Folake Dosu Folake Dosu
Updated on April 20, 2024

State and local governments make appeal for federal cybersecurity assistance

The House Homeland Security Committee held a panel to discuss state and local governments' ability to respond to cybersecurity threats.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Folake Dosu Folake Dosu
Updated on April 20, 2024

Senate subcommittee: Federal agencies' outdated systems put America's data at risk

The Permanent Subcommittee on Investigations of the Senate Homeland Security Committee issued a grave warning this week.

Folake Dosu Folake Dosu
Updated on April 20, 2024

Security analytics startup TrueFort raises $13.7 million

Evolution Equity Partners led the round, which also saw participation from Lytical Ventures and Emerald Development Managers.

Misha Seltzer Misha Seltzer
Updated on April 20, 2024

Security or Productivity? For Businesses Using SaaS Platforms, It’s a Balancing Act.

CISOs, you’ve got a big job on your hands. Read on to learn about the threat and how to mitigate it.

Lior Bar-Lev Lior Bar-Lev
Updated on April 20, 2024

Your CISO Should Be Integral to Your Company’s Growth Planning

As the company grows, so does its threat landscape.

David Moose Wolpoff David Moose Wolpoff
Updated on April 20, 2024

The 3 Types of CISOs You Should Know

CISOs come in three different flavors, but only one makes it more expensive for a hacker to get inside — and has the level of clout to drive institutional change.