Information Security Articles

Sorted By: Most Recent
Mike Hyzy Mike Hyzy
Updated on May 14, 2024

Why We Need AI Governance Now

Only by establishing robust governance mechanisms can we harness AI’s advantages while mitigating its potential liabilities.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Molly Fosco Molly Fosco
Updated on April 20, 2024

The People-Centric Data Security Solutions Companies Are Prioritizing

As data protection becomes a more formal business priority, many organizations are using new tools to upgrade their online security.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

Level Up Your Cybersecurity Operations With Threat-Informed Defense

Threat-informed defense is a proven method for maximizing your organization’s efficacy in preventing cyberattacks. This guide will introduce you to its basic principles.

Dawn Kawamoto Dawn Kawamoto
Updated on April 20, 2024

Why Your Next Hire Should Have a Cybersecurity Certification

Looking to fill that hole in your security team? These five cybersecurity certifications can help.

Image: Shutterstock / Built In
Dawn Kawamoto Dawn Kawamoto
Updated on April 20, 2024

Your Pathway Into a Cybersecurity Job Is Changing

An increasing number of Gen Z and millennials are going beyond the traditional IT-to-cybersecurity career path. Should you?

Dima Kovalenko Dima Kovalenko
Updated on October 04, 2023

4 Ways to Ensure Data Privacy for AI-Based Apps

Anonymization and dual AI networks are two ways developers can help keep AI-based apps secure.

Image: Shutterstock / Built In
Bailey Reiners Bailey Reiners
Updated on March 15, 2023

Cyber Security Recruitment: What You Need To Know

Take a deep dive into the data behind Cyber Security recruiting.