Information Security Articles

Sorted By: Most Recent
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In
Mark Weinstein Mark Weinstein
Updated on September 24, 2024

How to Keep Kids Safe Online Without Banning Encryption

While encryption may be the final frontier of digital privacy, it’s also rife with abuse. Here’s how to balance privacy with safety.

Image: Shutterstock / Built In
Mike Hyzy Mike Hyzy
Updated on August 12, 2024

Why We Need AI Governance Now

Only by establishing robust governance mechanisms can we harness AI’s advantages while mitigating its potential liabilities.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Molly Fosco Molly Fosco
Updated on April 20, 2024

The People-Centric Data Security Solutions Companies Are Prioritizing

As data protection becomes a more formal business priority, many organizations are using new tools to upgrade their online security.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

Level Up Your Cybersecurity Operations With Threat-Informed Defense

Threat-informed defense is a proven method for maximizing your organization’s efficacy in preventing cyberattacks. This guide will introduce you to its basic principles.

Dawn Kawamoto Dawn Kawamoto
Updated on April 20, 2024

Why Your Next Hire Should Have a Cybersecurity Certification

Looking to fill that hole in your security team? These five cybersecurity certifications can help.

Image: Shutterstock / Built In