Cybersecurity Frameworks Articles

Sorted By: Most Recent
Katlyn Gallo Katlyn Gallo
Updated on April 08, 2024

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control, or DAC, is an approach to systems security in which administrators grant users permission to access resources. Our expert explains how it works here.

Image: Shutterstock / Built In
Jessica Barker Jessica Barker
Updated on April 03, 2024

5 Tips to Protect Yourself Against Identity Fraud

Here are the red flags to watch out for — and the steps you can take before you even notice them.

Image: Shutterstock / Built In
Shree Mijarguttu Shree Mijarguttu
Updated on April 01, 2024

Top Security Risks of Cloud Computing

Cloud computing’s widespread adoption by businesses in recent years makes it a tempting target for cyberattackers. Our expert details some of the top risks you need to know and how to stay safe.

Image: Shutterstock / Built In
Rik Ferguson Rik Ferguson
Updated on February 20, 2024

AI Is Accelerating the Post-Trust Era. Is Your Business Ready?

Just as AI gives threat actors a whole new suite of tools to execute attacks, its increasing implementation opens new vulnerabilities as well. Our expert offers tips for protecting yourself.

Image: Shutterstock / Built In
Matias Madou Matias Madou
Updated on January 24, 2024

Do Your Developers Have Enough Time for Security Training?

Investing in secure code training for developers can reap big rewards in the face of a challenging threat landscape, but only if people have the time they need to learn meaningful lessons.

Image: Shutterstock / Built In
Kolawole Samuel Adebayo Kolawole Samuel Adebayo
Updated on January 23, 2024

Telecom Fraud Rages On. Can SMEs Keep Up in 2024?

As telecom frauds continue on an upward slope to cripple a vital segment of the global economy, here are proven ways to stay above bad actors.

Image: Shutterstock / Built In
Israel Mazin Israel Mazin
Updated on January 19, 2024

Navigating New Cybersecurity Regulations and Consumer Rights

The key to a safer cyber future may be a combination of compulsory and voluntary cybersecurity measures.

Image: Shutterstock / Built In
Marga Hoek Marga Hoek
Updated on January 12, 2024

What Is Relational Trust in Tech, and Why Do We Need to Build It?

People trust algorithms now more than ever before but are wary of how this powerful technology will be used.

Image: Shutterstock / Built In
Aimei Wei Aimei Wei
Updated on December 20, 2023

Why You Should Adopt Open XDR into Your Cybersecurity Strategy

It’s not enough just to have lots of strong tools anymore.

Image: Shutterstock / Built In
James Stanger James Stanger
Updated on December 19, 2023

How to Reduce Technical Debt and Bolster Your Cybersecurity

Failing to integrate IT best practices and team members into technical decisions can lead to ransomware attacks, data breaches and more. Here’s how to fix it.

Image: Shutterstock / Built In