Cybersecurity Articles

Sorted By: Most Recent
Tony Pepper Tony Pepper
Updated on April 20, 2024

Advanced Data Security Begins With the Human Element

Advanced data protection tools ensure that you’re offering employees a safety net while not interfering with productivity.

Quinten Dol Quinten Dol
Updated on April 20, 2024

Why Security Teams Turn to Cyber Range Technology as Online Threats Grow

How a dedicated space for failure helps companies like Accenture protect industrial control systems.

Yair Kuznitsov Yair Kuznitsov
Updated on April 19, 2024

Outlook on Data-Driven Compliance in 2022: 3 Trends Heating Up

Staying compliant with regulations shouldn’t be a chore. It should be an essential part of the business plan.

Barbara Tallent Barbara Tallent
Updated on April 19, 2024

The Internet Isn’t Perfect. How Can We Fix It?

This internet optimist believes that a combination of legislation, software and consumer choice can deliver us to a more ethical life online.

Mae Rice Mae Rice
Updated on April 19, 2024

7 Big Data Security Issues to Consider

What are the biggest security risks when it comes to our private digital information? We asked three experts about the potential vulnerabilities of big data.

Mae Rice Mae Rice
Updated on April 15, 2024

8 Security Architecture Do’s and Don’ts From 3 Industry Experts

We asked three experts about what makes this tech field tick.

Neko Papez Neko Papez
Updated on April 15, 2024

Weaponized Files: The Latest Cybersecurity Threat Explained

Weaponized files are files that have been injected with malware to compromise devices and steal data. Learn how it works and how to stop it.  

Image: Shutterstock / Built In
Tammy Xu Tammy Xu
Updated on April 15, 2024

Cryptographers Are Racing Against Quantum Computers

Today’s security schemes will soon be obsolete.

Image: Shutterstock / Built In
David Balaban David Balaban
Updated on April 15, 2024

How to Protect Your System From Botnet Malware

A look into the present-day botnet ecosystem and best practices to thwart increasingly sophisticated attacks.

Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

MFA Fatigue: What It Is and How to Avoid It

MFA fatigue, also known as MFA abuse attacks, are a type of cyber threat that is on the rise. Familiarize yourself with the risks so you don’t fall victim.

Image: Shutterstock / Built In