Cybersecurity Articles

Sorted By: Most Recent
John Story John Story
Updated on April 22, 2024

Startups Should Have a Chief Data Ethics Officer

Big Tech is having to backtrack and fix major data-use mistakes to regain consumer trust. Startups can get it right from day one.

Andre Schindler Andre Schindler
Updated on April 22, 2024

When It Comes to Remote Security Challenges, Communication Is Key

Create a culture of open dialogue and transparency to increase defenses and reduce risk.

Young Entrepreneur Council Young Entrepreneur Council
Updated on April 22, 2024

12 Smart Ways to Protect Corporate Data When Working From Home

Members of the Young Entrepreneur Council discuss the best strategies for making sure sensitive company information is always protected.

Mitchell Telatnik Mitchell Telatnik
Updated on April 20, 2024

Your Organization Needs Zero Trust Architecture

What is zero trust and how does it improve your company’s cybersecurity posture?

Ralph Rodriguez Ralph Rodriguez
Updated on April 20, 2024

Welcome to the Era of the Zero-Trust Consumer

Zero-trust architecture, in which everything is treated as a potential threat, is becoming the norm in industry. Our expert suggests it’s time to make the consumer a part of that framework.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Zero Trust: What It Is and Important Aspects of It

Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Arman Sarhaddar Arman Sarhaddar
Updated on April 20, 2024

How Blockchain Can Put a Stop to Counterfeit Drugs

Pharmaceutical companies have tried to monitor their suppliers and verify the authenticity of their supply chain, but full protection has been difficult — until now.

David Koff David Koff
Updated on April 20, 2024

What a VPN Is — and Why You Should Use One

Few web tools are as poorly understood as VPNs because there’s a plethora of misinformation around their purpose and function. Understanding them better will help you to get the most out of their service.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Red Teaming: A Proactive Approach to Identifying Cyber Threats

Red teaming assesses the effectiveness of a security operations center.

Image: Shutterstock / Built In