Cybersecurity Articles

Sorted By: Most Recent
David Moose Wolpoff David Moose Wolpoff
Updated on April 20, 2024

Burnout in Cybersecurity Is on the Rise. That’s Because It’s an Unwinnable Game.

How a  philosophical shift in the way executives view cybersecurity can help your team avoid fatigue.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

CSPM: An Introduction to Cloud Security Posture Management

Cloud Security Posture Management is a vital part of a robust defense against cyberattacks for any business that uses cloud computing. Here, our expert introduces you to its components.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Cryptography?

Cryptography is the study of secure communication methods that enable only the sender and the intended recipient to view a message’s content.

Image: Shutterstock / Built In
Andrew Gitt Andrew Gitt
Updated on April 20, 2024

What to Consider When Choosing a Corporate VPN for Remote Workers

Providing access to company data from remote locations presents a host of security vulnerabilities. Here’s how to protect yourself.

Tammy Xu Tammy Xu
Updated on April 20, 2024

How the Cyber Threat Coalition Fights Pandemic-Inspired Cybercrime

Meet the organizers behind the COVID-19 Cyber Threat Coalition.

Aner Gelman Aner Gelman
Updated on April 20, 2024

The Next Big Cybersecurity Threat Is Connected SaaS Platforms

What to do to keep your company safe.

David Balaban David Balaban
Updated on April 20, 2024

6 WordPress Plugin Vulnerabilities Breached by Hackers

A look at popular plugins that have fallen prey to malicious actors, and ways to protect yourself from future attacks.

David Koff David Koff
Updated on April 20, 2024

4 Methods and Tools for Enhanced Privacy in a Digital Age

Chances are, you should protect your personal information more than you currently do. Use these tools to enhance your security and guard your privacy.

Jon Lucas Jon Lucas
Updated on April 20, 2024

3 Things to Consider Before Choosing a Disaster Recovery Solution

With disasters and attacks on the rise, back-up solutions should be core to any digital transformation strategy.

Neil Daswani and Moudy Elbayadi Neil Daswani and Moudy Elbayadi
Updated on April 20, 2024

3 Pragmatic Root Causes of Data Breaches

At the highest level, cybersecurity breaches are the result of one of three problems: lack or prioritization, lack of investment or poor execution of security procedures.