Cybersecurity Articles

Sorted By: Most Recent
Updated on April 20, 2024

State and local governments make appeal for federal cybersecurity assistance

The House Homeland Security Committee held a panel to discuss state and local governments' ability to respond to cybersecurity threats.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

What Is Spear Phishing?

Spear phishing is a social engineering technique that malicious individuals use to trick targeted individuals into providing sensitive information, usually via email.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Updated on April 20, 2024

Senate subcommittee: Federal agencies' outdated systems put America's data at risk

The Permanent Subcommittee on Investigations of the Senate Homeland Security Committee issued a grave warning this week.

Updated on April 20, 2024

Security analytics startup TrueFort raises $13.7 million

Evolution Equity Partners led the round, which also saw participation from Lytical Ventures and Emerald Development Managers.

Misha Seltzer Misha Seltzer
Updated on April 20, 2024

Security or Productivity? For Businesses Using SaaS Platforms, It’s a Balancing Act.

CISOs, you’ve got a big job on your hands. Read on to learn about the threat and how to mitigate it.

Lior Bar-Lev Lior Bar-Lev
Updated on April 20, 2024

Your CISO Should Be Integral to Your Company’s Growth Planning

As the company grows, so does its threat landscape.

David Moose Wolpoff David Moose Wolpoff
Updated on April 20, 2024

The 3 Types of CISOs You Should Know

CISOs come in three different flavors, but only one makes it more expensive for a hacker to get inside — and has the level of clout to drive institutional change.

Tillmann Schwabe Tillmann Schwabe
Updated on April 20, 2024

Why You Need Mobile-Device Management to Protect Your Remote Workforce

As companies look to close cybersecurity gaps and relieve the pressure on IT teams, MDMs offer a clear fix. 

Brian Nordli Brian Nordli
Updated on April 20, 2024

Red Canary Explains What Happens After a Company Gets Hacked

Breaking down a breach with Red Canary’s response team.