Cybersecurity Articles

Sorted By: Most Recent
Updated on April 20, 2024

The Real Cost of Ransomware, and What Can Be Done About It

Data breaches keep getting bigger and more costly. How should an organization face this growing threat?

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Is the Source of the Next Big Data Breach Sitting in Your Conference Room?

LockBit and other ransomware has found the path of least resistance into corporate systems: They buy their way in, bribing insiders for access.

David Balaban David Balaban
Updated on April 20, 2024

Here’s What You Should Consider When Choosing a DLP System

These questions will help you determine whether a data loss prevention system will fit your needs.

Nancy Wang Nancy Wang
Updated on April 20, 2024

Evolve Your IT Strategy to Defend Against Ransomware Attacks

Protect your business assets by incorporating the PIDR data protection framework Nancy Wang uses in her work as a general manager at Amazon Web Services.

Jacob Sever Jacob Sever
Updated on April 20, 2024

5 Efficient Ways to Prevent Fraud in Fintech

By blending multiple new technologies, you can maximize your security — and protect your customers.

Updated on April 20, 2024

In Cybersecurity, Attribution of Cyber Attacks Is a Red Herring

When your system’s under attack, does it matter who’s attacking?

Apu Pavithran Apu Pavithran
Updated on April 20, 2024

The Days of Passwords Are Numbered. Is Your Business Ready?

Passwords are no longer up to the task of protecting sophisticated systems from cybercriminal intrusion. Our expert offers guidance on getting ready for what’s coming next.

Image: Shutterstock / Built In
Updated on April 20, 2024

Political parties are still in danger of being hacked, warns new report

New York–based risk analysis firm SecurityScorecard investigated the networks operated by 29 political parties from 11 countries.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

When and How to Run a Phishing Simulation

An uptick in cybersecurity events might mean your employees need help in recognizing phishing scams.

Image: Shutterstock / Built In
Brian Nordli Brian Nordli
Updated on April 20, 2024

Penetration Testing: What It Is, and How to Do It Well

Here’s how penetration testers exploit security weaknesses in an effort to help companies patch them.