Cybersecurity Articles

Sorted By: Most Recent
Katlyn Gallo Katlyn Gallo
Updated on April 08, 2024

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control, or DAC, is an approach to systems security in which administrators grant users permission to access resources. Our expert explains how it works here.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on April 08, 2024

What Is End-to-End Encryption?

End-to-end encryption is a secure communication method that allows only the sender and intended recipient to access the contents of a message or file. Here’s how it works.

Image: Built In / Shutterstock
Tatum Hunter Tatum Hunter
Updated on April 08, 2024

Steganography: The Undetectable Cybersecurity Threat

Steganography is among the stealthiest of cyberthreats.

Image: Shutterstock
Anthony Corbo Anthony Corbo
Updated on April 08, 2024

What Is Cloud Security?

Cloud security refers to measures taken to protect data, infrastructure, applications and the integrity of cloud environments.

Image: Shutterstock / Built In
Updated on April 04, 2024

Growing IoT Networks Pose New Challenges For Cybersecurity Teams

How Impinj and Balbix are adjusting their security offerings to guard against a new wave of attacks on IoT systems.

Jessica Barker Jessica Barker
Updated on April 03, 2024

5 Tips to Protect Yourself Against Identity Fraud

Here are the red flags to watch out for — and the steps you can take before you even notice them.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on April 01, 2024

What Is a Firewall?

A firewall acts as a gatekeeper that allows only authorized traffic to pass through while blocking unwanted traffic. Here’s why they’re a crucial component of your network design.

Image: Shutterstock / Built In
Shree Mijarguttu Shree Mijarguttu
Updated on April 01, 2024

Top Security Risks of Cloud Computing

Cloud computing’s widespread adoption by businesses in recent years makes it a tempting target for cyberattackers. Our expert details some of the top risks you need to know and how to stay safe.

Image: Shutterstock / Built In
Asim Rahal Asim Rahal
Updated on March 20, 2024

Don’t Be Compliance-First. Be Risk-First Instead.

A risk-first approach focuses on a company’s most significant compliance risks rather than an arbitrary list of regulations.

Image: Shutterstock / Built In
Frank H. McCourt, Jr. and Michael J. Casey Frank H. McCourt, Jr. and Michael J. Casey
Updated on March 12, 2024

What If We Lived in an Open Data Economy?

In an excerpt from their latest book, our experts imagine a world where we’re in control of our own online experience.