Cybersecurity Articles

Sorted By: Most Recent
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Is the Source of the Next Big Data Breach Sitting in Your Conference Room?

LockBit and other ransomware has found the path of least resistance into corporate systems: They buy their way in, bribing insiders for access.

David Balaban David Balaban
Updated on April 20, 2024

Here’s What You Should Consider When Choosing a DLP System

These questions will help you determine whether a data loss prevention system will fit your needs.

Nancy Wang Nancy Wang
Updated on April 20, 2024

Evolve Your IT Strategy to Defend Against Ransomware Attacks

Protect your business assets by incorporating the PIDR data protection framework Nancy Wang uses in her work as a general manager at Amazon Web Services.

Jacob Sever Jacob Sever
Updated on April 20, 2024

5 Efficient Ways to Prevent Fraud in Fintech

By blending multiple new technologies, you can maximize your security — and protect your customers.

Updated on April 20, 2024

In Cybersecurity, Attribution of Cyber Attacks Is a Red Herring

When your system’s under attack, does it matter who’s attacking?

Apu Pavithran Apu Pavithran
Updated on April 20, 2024

The Days of Passwords Are Numbered. Is Your Business Ready?

Passwords are no longer up to the task of protecting sophisticated systems from cybercriminal intrusion. Our expert offers guidance on getting ready for what’s coming next.

Image: Shutterstock / Built In
Updated on April 20, 2024

Political parties are still in danger of being hacked, warns new report

New York–based risk analysis firm SecurityScorecard investigated the networks operated by 29 political parties from 11 countries.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

When and How to Run a Phishing Simulation

An uptick in cybersecurity events might mean your employees need help in recognizing phishing scams.

Image: Shutterstock / Built In
Brian Nordli Brian Nordli
Updated on April 20, 2024

Penetration Testing: What It Is, and How to Do It Well

Here’s how penetration testers exploit security weaknesses in an effort to help companies patch them.

Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In