Cybersecurity Articles

Sorted By: Most Recent
Folake Dosu Folake Dosu
Updated on April 20, 2024

Political parties are still in danger of being hacked, warns new report

New York–based risk analysis firm SecurityScorecard investigated the networks operated by 29 political parties from 11 countries.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

When and How to Run a Phishing Simulation

An uptick in cybersecurity events might mean your employees need help in recognizing phishing scams.

Image: Shutterstock / Built In
Brian Nordli Brian Nordli
Updated on April 20, 2024

Penetration Testing: What It Is, and How to Do It Well

Here’s how penetration testers exploit security weaknesses in an effort to help companies patch them.

Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Colin Pape Colin Pape
Updated on April 20, 2024

3 Simple Ways to Protect Your Privacy Online in 2022

The start of a new year is a great time to upgrade your browsing and online shopping habits.

Joshua Burnham Joshua Burnham
Updated on April 20, 2024

How the Cybersecurity Industry Is Evolving

In honor of cybersecurity awareness month, here are some new industry trends to keep an eye on.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

An Introduction to Microsegmentation in Network Security

Microsegmentation is a popular security framework that limits vulnerability to cyberattacks and mitigates the damage attackers can do to your systems. Our expert explains how it works.

Image: Shutterstock / Built In
Folake Dosu Folake Dosu
Updated on April 20, 2024

Managed security startup Expel secures $40 million

Index Ventures led the round, with Battery Ventures, Greycroft, NEA, Paladin Capital Group and Scale Venture Partners also participating.

Andre Ferraz Andre Ferraz
Updated on April 20, 2024

How Location Fingerprinting Can Thwart Fraud

Exact location collection technology gives it an edge over traditional device fingerprinting.

Image: Shutterstock / Built In
Folake Dosu Folake Dosu
Updated on April 20, 2024

Local and state governments struggling with network security, official says

Rick Driggers, the deputy assistant director for cybersecurity at DHS’s Cybersecurity and Infrastructure Agency, surfaced potential risks.