Cybersecurity Frameworks Articles

Sorted By: Most Recent
Mark Weinstein Mark Weinstein
Updated on September 24, 2024

How to Keep Kids Safe Online Without Banning Encryption

While encryption may be the final frontier of digital privacy, it’s also rife with abuse. Here’s how to balance privacy with safety.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on September 12, 2024

Understanding ISO 42001: A Framework for Responsible AI

ISO 42001 controls and policies form the first international AI management system standard. Here's what you need to know.

Image: Shutterstock
Rebecca Tague Rebecca Tague
Updated on September 12, 2024

What Is an Advanced Persistent Threat (APT)?

APTs are sophisticated, often long-term cyberattacks where attackers establish a foothold within a network and remain undetected for an extended period.

Image: Shutterstock / Built In
Sashank Purighalla Sashank Purighalla
Updated on September 04, 2024

How to Keep Your Cloud Migration From Becoming Dangerous

Cloud computing offers businesses ample benefits, but making the switch can introduce myriad risks. Our expert explains how to handle the shift safely.

Image: Shutterstock / Built In
Andre Ferraz Andre Ferraz
Updated on August 30, 2024

3 Ways to Combat Fraud Across the Entire Organization

Support for an integrated fraud prevention program needs to come from the highest rungs of leadership and should focus on these three key goals.

Image: Shutterstock / Built In
Alex Tray Alex Tray
Updated on August 28, 2024

How to Use the SCP Command in Linux to Securely Transfer Files

Learn how to use the SCP command-line utility in Linux to ensure secure file copying and transfers from local systems to remote nodes and vice versa.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on August 21, 2024

How to Securely Transfer Files Using SFTP

Secure file transfer protocol (SFTP) is a secure and encrypted method of transferring files over a network. Learn how it works.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on August 14, 2024

3 Ways to Protect Your Wearables and Rugged Devices From Cyber Attacks

It’s time to treat non-traditional endpoint security with the same urgency as smartphones and laptops. Here’s how.

Image: Shutterstock / Built In
Nicos Vekiarides Nicos Vekiarides
Updated on August 13, 2024

How Deepfakes Threaten the Integrity of the 2024 Election

Generative AI is making it increasingly difficult to discern real content from fake. As election season approaches, here’s how you can increase your vigilance.

Image: Shutterstock / Built In
Shamael Zaheer Khan Shamael Zaheer Khan
Updated on August 12, 2024

How to Defend Against Deepfakes

As deepfakes become more prevalent, businesses need to protect against them. Here’s how to defend against deepfake attacks.

Image: Shutterstock / Built In