Cybersecurity Articles

Sorted By: Most Recent
Brooke Becher Brooke Becher
Updated on December 20, 2024

What Is Cryptojacking?

Cryptojackers aren’t targeting your data or looking to harm your computer. Instead, they’re after your processing power, quietly siphoning it to mine cryptocurrency undetectably in the background.

Image naming convention: Image: Shutterstock
Daniel Pearson Daniel Pearson
Updated on December 19, 2024

The Rise and Risks of Quantum Computing in 2025

While quantum computing promises unparalleled computational power, it will also introduce new cybersecurity risks. Here’s how to prepare.

Image: Shutterstock / Built In
Chris Gibson Chris Gibson
Updated on December 19, 2024

How AI Is Transforming Cyber Threats in 2025

AI is poised to reshape both cybersecurity and cyber attacks in 2025. Here’s what to expect and how to prepare.

Image: Shutterstock / Built In
Ellen Glover Ellen Glover
Updated on December 18, 2024

Online Privacy: What It Is and Tips for Protecting It

Online privacy refers to protecting one’s personal information while using the internet. These are the reasons why online privacy matters, threats to online privacy and essential tips for protecting one’s online privacy.

Image: Shutterstock
Judith Etugbo Judith Etugbo
Updated on December 17, 2024

Cybersecurity Risks of Cross-Chain Interoperability Explained

Cross-chain interoperability enables different blockchains to exchange data and transfer assets, but it also poses significant cybersecurity risks. Here’s what you need to know.

Image: Shutterstock / Built In
Sebastian Straub Sebastian Straub
Updated on December 17, 2024

5 Ways AI Will Transform Disaster Recovery

AI models have the potential to transform disaster recovery through predictive analytics, intelligent backup and restoration and more. Here’s how.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Taylor Rose Taylor Rose
Updated on December 16, 2024

‘Digital Risk is Human Risk’: Inside Nisos’ New Service of Human Risk Management  

Through its new service, managed intelligence company Nisos can help customers uncover their human-driven digital threats and vulnerabilities. 

Photo: Nisos 
Brand Studio Logo
Taylor Rose Taylor Rose
Updated on December 13, 2024

How FirstBank Uses AI to Fortify Its Cybersecurity Defense

An inside look at how FirstBank’s tech and security teams use AI to identify anomalies and anomalous behaviors, and improve incident response time.

Photo: FirstBank
Brand Studio Logo
Sean Tilley Sean Tilley
Updated on December 06, 2024

Everything You Need to Know About the 2025 Digital Operational Resilience Act

What is DORA, and how can you prepare for it?

Image: Shutterstock / Built In