Cybersecurity Frameworks Articles

Sorted By: Most Recent
Andrey Koptelov Andrey Koptelov
Updated on April 20, 2024

Why AI Is the New Front Line in Cybersecurity

As artificial intelligence and machine learning become more common in cyber attacks, the technologies will also have a larger role to play in hardening defenses.

Image: Shutterstock / Built In
Neko Papez Neko Papez
Updated on April 15, 2024

Weaponized Files: The Latest Cybersecurity Threat Explained

Weaponized files are files that have been injected with malware to compromise devices and steal data. Learn how it works and how to stop it.  

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

How to Build an Effective Cybersecurity Program for Your Business

Because of the increasing number of threats, every business needs a comprehensive cybersecurity program. Here are the most important components you need to include.

Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
Stephen Gossett Stephen Gossett
Updated on April 12, 2024

What Every Developer Should Know About Threat Modeling

You might be doing it already without even realizing it.

Mae Rice Mae Rice
Updated on April 08, 2024

19 Top Cybersecurity Training Programs and Online Courses to Know

These courses cover everything from malware analysis to cloud security.

Image: Shutterstock
Brand Studio Logo
Katlyn Gallo Katlyn Gallo
Updated on April 08, 2024

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control, or DAC, is an approach to systems security in which administrators grant users permission to access resources. Our expert explains how it works here.

Image: Shutterstock / Built In
Jessica Barker Jessica Barker
Updated on April 03, 2024

5 Tips to Protect Yourself Against Identity Fraud

Here are the red flags to watch out for — and the steps you can take before you even notice them.

Image: Shutterstock / Built In
Shree Mijarguttu Shree Mijarguttu
Updated on April 01, 2024

Top Security Risks of Cloud Computing

Cloud computing’s widespread adoption by businesses in recent years makes it a tempting target for cyberattackers. Our expert details some of the top risks you need to know and how to stay safe.

Image: Shutterstock / Built In
Rik Ferguson Rik Ferguson
Updated on February 20, 2024

AI Is Accelerating the Post-Trust Era. Is Your Business Ready?

Just as AI gives threat actors a whole new suite of tools to execute attacks, its increasing implementation opens new vulnerabilities as well. Our expert offers tips for protecting yourself.

Image: Shutterstock / Built In