Security Articles

Sorted By: Most Recent
Asim Rahal Asim Rahal
Updated on March 20, 2024

Don’t Be Compliance-First. Be Risk-First Instead.

A risk-first approach focuses on a company’s most significant compliance risks rather than an arbitrary list of regulations.

Image: Shutterstock / Built In
Frank H. McCourt, Jr. and Michael J. Casey Frank H. McCourt, Jr. and Michael J. Casey
Updated on March 12, 2024

What If We Lived in an Open Data Economy?

In an excerpt from their latest book, our experts imagine a world where we’re in control of our own online experience.

James Kubik James Kubik
Updated on March 11, 2024

Are You Prepared for Communications Failure in an Emergency?

In a crisis, technology is only as powerful as it is accessible.

Image: Shutterstock / Built In
Kolawole Samuel Adebayo Kolawole Samuel Adebayo
Updated on January 23, 2024

Telecom Fraud Rages On. Can SMEs Keep Up in 2024?

As telecom frauds continue on an upward slope to cripple a vital segment of the global economy, here are proven ways to stay above bad actors.

Image: Shutterstock / Built In
Israel Mazin Israel Mazin
Updated on January 19, 2024

Navigating New Cybersecurity Regulations and Consumer Rights

The key to a safer cyber future may be a combination of compulsory and voluntary cybersecurity measures.

Image: Shutterstock / Built In
Marga Hoek Marga Hoek
Updated on January 12, 2024

What Is Relational Trust in Tech, and Why Do We Need to Build It?

People trust algorithms now more than ever before but are wary of how this powerful technology will be used.

Image: Shutterstock / Built In
Aimei Wei Aimei Wei
Updated on December 20, 2023

Why You Should Adopt Open XDR into Your Cybersecurity Strategy

It’s not enough just to have lots of strong tools anymore.

Image: Shutterstock / Built In
Sohail Shaikh Sohail Shaikh
Updated on November 03, 2023

10 iOS App Development Trends Worth Knowing

From Swift to sustainability, they can help you build a more successful iOS app.

Image: Shutterstock / Built In
Dima Kovalenko Dima Kovalenko
Updated on October 04, 2023

4 Ways to Ensure Data Privacy for AI-Based Apps

Anonymization and dual AI networks are two ways developers can help keep AI-based apps secure.

Image: Shutterstock / Built In
Satyam Tripathi Satyam Tripathi
Updated on October 04, 2023

WAN vs LAN: Differences Between the Two Networks

Make better decisions when you know the difference between a wide area network and a local area network.

Image: Shutterstock / Built In