Security Articles

Sorted By: Most Recent
Ellen Glover Ellen Glover
Updated on December 18, 2024

Online Privacy: What It Is and Tips for Protecting It

Online privacy refers to protecting one’s personal information while using the internet. These are the reasons why online privacy matters, threats to online privacy and essential tips for protecting one’s online privacy.

Image: Shutterstock
Taylor Rose Taylor Rose
Updated on December 16, 2024

‘Digital Risk is Human Risk’: Inside Nisos’ New Service of Human Risk Management  

Through its new service, managed intelligence company Nisos can help customers uncover their human-driven digital threats and vulnerabilities. 

Photo: Nisos 
Brand Studio Logo
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Tomer Filiba Tomer Filiba
Updated on November 25, 2024

3 Cloud Security Hacks to Prevent Hacks

When SecOps teams are stretched thin, here are three high impact ways DevOps teams can help them curb cloud risks.

Image: Shutterstock / Built In
Brandon Wiebe Brandon Wiebe
Updated on November 08, 2024

Does Your Organization Need a Field Chief Privacy Officer?

The field CPO is the connective tissue between companies, focused on education, advocacy and community. Here’s what to know if you’re thinking of hiring for the role.

Image: Shutterstock / Built In
James Boyle James Boyle
Updated on October 22, 2024

Is AI on Its Way to Gaining Rights?

No, it’s not science fiction. Here’s what we can expect from looking at how corporations have gained personhood.

Image: Shutterstock / Built In
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In
Ian Paterson Ian Paterson
Updated on October 01, 2024

Here’s How Behavioral Biometrics Can Boost Security

Behavioral biometrics use employees’ unique behaviors to reduce cyberthreats.

Image: Shutterstock / Built In
Mark Weinstein Mark Weinstein
Updated on September 24, 2024

How to Keep Kids Safe Online Without Banning Encryption

While encryption may be the final frontier of digital privacy, it’s also rife with abuse. Here’s how to balance privacy with safety.

Image: Shutterstock / Built In