Cybersecurity Frameworks Articles

Sorted By: Most Recent
Thulasi Rangan Jayakumar Thulasi Rangan Jayakumar
Updated on February 19, 2025

What Is Anomaly Detection?

Anomaly detection involves finding deviations from expected patterns in order to proactively safeguard systems. Our expert explains how it works.

Image: Shutterstock / Built In
Chintan Parikh Chintan Parikh
Updated on February 05, 2025

5 Cybersecurity Challenges Companies Must Navigate in 2025

The rise of intelligent social engineering attacks is just one of the cyber threats companies will need to prepare for in 2025. Here’s what leaders need to know.

Image: Shutterstock / Built In
Minghong Fang Minghong Fang
Updated on January 24, 2025

Federated Learning Has Security Holes. Here’s How to Fix Them.

Our expert presents solutions to poisoning attacks in distributed machine learning, ensuring that privacy and efficiency can go hand-in-hand.

Image: Shutterstock / Built In
Carsten Rhod Gregersen Carsten Rhod Gregersen
Updated on January 17, 2025

More Endpoints, More Problems. Here’s How IoT Can (and Should) Fight Back in 2025.

Great growth demands great responsibility in IoT. Let’s make sure devices deliver on their promise without compromising our security.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on January 07, 2025

32 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock
Daniel Pearson Daniel Pearson
Updated on December 19, 2024

The Rise and Risks of Quantum Computing in 2025

While quantum computing promises unparalleled computational power, it will also introduce new cybersecurity risks. Here’s how to prepare.

Image: Shutterstock / Built In
Chris Gibson Chris Gibson
Updated on December 19, 2024

How AI Is Transforming Cyber Threats in 2025

AI is poised to reshape both cybersecurity and cyber attacks in 2025. Here’s what to expect and how to prepare.

Image: Shutterstock / Built In
Judith Etugbo Judith Etugbo
Updated on December 17, 2024

Cybersecurity Risks of Cross-Chain Interoperability Explained

Cross-chain interoperability enables different blockchains to exchange data and transfer assets, but it also poses significant cybersecurity risks. Here’s what you need to know.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Sean Tilley Sean Tilley
Updated on December 06, 2024

Everything You Need to Know About the 2025 Digital Operational Resilience Act

What is DORA, and how can you prepare for it?

Image: Shutterstock / Built In