IT Risk Management Articles

Sorted By: Most Recent
Chris Gibson Chris Gibson
Updated on December 19, 2024

How AI Is Transforming Cyber Threats in 2025

AI is poised to reshape both cybersecurity and cyber attacks in 2025. Here’s what to expect and how to prepare.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
T.K. Keanini T.K. Keanini
Updated on November 21, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Nazy Fouladirad Nazy Fouladirad
Updated on October 01, 2024

So, You’ve Been Hacked. Now What?

Cyber attacks can happen to any company. Here’s what to do after a breach and how to protect your business against another one.

Image: Shutterstock / Built In
Michael Schank Michael Schank
Updated on September 04, 2024

How to Build Operational Resilience With Process Management

With the Process Inventory Framework, you can make your organization more robust, secure and compliant. Here’s how.

Image: Shutterstock / Built In
Andre Ferraz Andre Ferraz
Updated on August 30, 2024

3 Ways to Combat Fraud Across the Entire Organization

Support for an integrated fraud prevention program needs to come from the highest rungs of leadership and should focus on these three key goals.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on August 14, 2024

3 Ways to Protect Your Wearables and Rugged Devices From Cyber Attacks

It’s time to treat non-traditional endpoint security with the same urgency as smartphones and laptops. Here’s how.

Image: Shutterstock / Built In
Akshay Kumar Akshay Kumar
Updated on August 09, 2024

SSH Port Forwarding (SSH Tunneling): How-To Guide

SSH port forwarding is a method for safely transmitting data over an encrypted SSH connection between a local and distant server. Here’s what to know.

Image: Shutterstock / Built In