IT Risk Management Articles

Sorted By: Most Recent
Andy Maus Andy Maus
Updated on August 18, 2025

Lessons From a Major Cyber Attack on a City Government

The recent ransomware attack on St. Paul, Minnesota underscores a larger pattern of cyber attacks affecting municipalities across the U.S. Here’s what can be done about it. 

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on August 01, 2025

How AI Streamlines Software Project Risk Management

AI tools can simplify risk management in your software projects. Here’s how.

Image: Shutterstock / Built In
Éireann Leverett Éireann Leverett
Updated on June 05, 2025

How Cybersecurity Teams Can Stay Ahead in 2025 and Beyond

Chat logs from cyber threat group Black Basta reveal that a company’s greatest vulnerability is its overlooked infrastructure. Here’s what that means for cybersecurity defense.

Image: Shutterstock / Built In
Matt Hillary Matt Hillary
Updated on May 21, 2025

Automate Your Governance, Risk and Compliance Processes

Despite advancements in GRC automation, too many companies still allow it to be a slow and cumbersome process. Our expert explains how to embrace the future.

Image: Shutterstock / Built In
Toni de la Fuente Toni de la Fuente
Updated on April 17, 2025

Why Open Source Is the Future of Cloud Protection

Open-source cloud security tools offer increased transparency, flexibility and control. Here’s why it might signal the end of black-box security solutions.

Image: Shutterstock / Built In
Matt Almassian Matt Almassian
Updated on March 04, 2025

Why Smart Companies Are Granting AI Immunity to Their Employees

Employees are using AI tools whether they’re authorized or not. Instead of cracking down on AI usage, consider developing an AI amnesty program. Learn more.

Image: Shutterstock / Built In
Chris Gibson Chris Gibson
Updated on December 19, 2024

How AI Is Transforming Cyber Threats in 2025

AI is poised to reshape both cybersecurity and cyber attacks in 2025. Here’s what to expect and how to prepare.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In