Cybersecurity Frameworks Articles

Sorted By: Most Recent
Daniel Pearson Daniel Pearson
Updated on December 19, 2024

The Rise and Risks of Quantum Computing in 2025

While quantum computing promises unparalleled computational power, it will also introduce new cybersecurity risks. Here’s how to prepare.

Image: Shutterstock / Built In
Chris Gibson Chris Gibson
Updated on December 19, 2024

How AI Is Transforming Cyber Threats in 2025

AI is poised to reshape both cybersecurity and cyber attacks in 2025. Here’s what to expect and how to prepare.

Image: Shutterstock / Built In
Judith Etugbo Judith Etugbo
Updated on December 17, 2024

Cybersecurity Risks of Cross-Chain Interoperability Explained

Cross-chain interoperability enables different blockchains to exchange data and transfer assets, but it also poses significant cybersecurity risks. Here’s what you need to know.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Sean Tilley Sean Tilley
Updated on December 06, 2024

Everything You Need to Know About the 2025 Digital Operational Resilience Act

What is DORA, and how can you prepare for it?

Image: Shutterstock / Built In
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Nenad Zaric Nenad Zaric
Updated on November 19, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Nick Ascoli Nick Ascoli
Updated on November 12, 2024

How to Use AI and LLMs to Eavesdrop on Potential Attackers

Cybercriminals constantly upgrade their methods of attack, and their increasing sophistication can be exacerbated by language barriers and the ever-present time and money crunch. Our expert explains how new AI tools can help you solve these problems.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on October 29, 2024

31 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock