Cybersecurity Incident Response + Handling Articles

Sorted By: Most Recent
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
T.K. Keanini T.K. Keanini
Updated on November 21, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Nenad Zaric Nenad Zaric
Updated on November 19, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Nick Ascoli Nick Ascoli
Updated on November 12, 2024

How to Use AI and LLMs to Eavesdrop on Potential Attackers

Cybercriminals constantly upgrade their methods of attack, and their increasing sophistication can be exacerbated by language barriers and the ever-present time and money crunch. Our expert explains how new AI tools can help you solve these problems.

Image: Shutterstock / Built In
Sascha Giese Sascha Giese
Updated on October 09, 2024

How to Exorcise the Modern Horrors of IT

Your average IT team faces as many shadowy monsters as a camper in a horror movie. Our expert gives you some tools to battle back against them.

Image: Shutterstock / Built In
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In
Nazy Fouladirad Nazy Fouladirad
Updated on October 01, 2024

So, You’ve Been Hacked. Now What?

Cyber attacks can happen to any company. Here’s what to do after a breach and how to protect your business against another one.

Image: Shutterstock / Built In
Rebecca Tague Rebecca Tague
Updated on September 12, 2024

What Is an Advanced Persistent Threat (APT)?

APTs are sophisticated, often long-term cyberattacks where attackers establish a foothold within a network and remain undetected for an extended period.

Image: Shutterstock / Built In