Cybersecurity Incident Response + Handling Articles

Sorted By: Most Recent
Rebecca Tague Rebecca Tague
Updated on September 12, 2024

What Is an Advanced Persistent Threat (APT)?

APTs are sophisticated, often long-term cyberattacks where attackers establish a foothold within a network and remain undetected for an extended period.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on August 08, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on July 09, 2024

A Log Analysis Tutorial

Log analysis is the process of analyzing computer-generated record of events in a digital environment to identify suspicious activity. Learn how it works.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on April 22, 2024

The IoT Needs to Enter Its Secure Age Right Now

Experts project a coming explosion in the number of internet-connected devices in circulation. To prepare for that growth, we need to make sure our endpoints are secure.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Zero Trust: What It Is and Important Aspects of It

Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Martin Kuhlmann Martin Kuhlmann
Updated on April 20, 2024

Why Strong Identity Management Matters Now More Than Ever

A rapidly evolving landscape of cyber threats amid economic instability is a recipe for attacks. Our expert explains how identity management is a strong solution.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on April 20, 2024

The Days of Passwords Are Numbered. Is Your Business Ready?

Passwords are no longer up to the task of protecting sophisticated systems from cybercriminal intrusion. Our expert offers guidance on getting ready for what’s coming next.

Image: Shutterstock / Built In