Cybersecurity Articles

Sorted By: Most Recent
Nazy Fouladirad Nazy Fouladirad
Updated on October 01, 2024

So, You’ve Been Hacked. Now What?

Cyber attacks can happen to any company. Here’s what to do after a breach and how to protect your business against another one.

Image: Shutterstock / Built In
Ian Paterson Ian Paterson
Updated on October 01, 2024

Here’s How Behavioral Biometrics Can Boost Security

Behavioral biometrics use employees’ unique behaviors to reduce cyberthreats.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on September 30, 2024

What Is Hashing? A Guide With Examples.

Hashing is an important concept in cybersecurity as it allows for the safe encryption of data. This guide explains its principles and applications.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on September 26, 2024

31 Top Cloud Security Companies to Know

Cybersecurity for the cloud is important for your business. Here are companies that specialize in it.

Image: Shutterstock
Updated on September 25, 2024

5 Top Facial Recognition Companies

These facial recognition companies develop technology with a wide range of uses for both businesses and consumers.

Photo: Shutterstock
Updated on September 25, 2024

6 Companies Hiring Ethical Hackers

These companies use a range of cybersecurity tools and approaches to prevent hackers and malware from getting through

Photo: Shutterstock
Mark Weinstein Mark Weinstein
Updated on September 24, 2024

How to Keep Kids Safe Online Without Banning Encryption

While encryption may be the final frontier of digital privacy, it’s also rife with abuse. Here’s how to balance privacy with safety.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on September 12, 2024

Understanding ISO 42001: A Framework for Responsible AI

ISO 42001 controls and policies form the first international AI management system standard. Here's what you need to know.

Image: Shutterstock
Rebecca Tague Rebecca Tague
Updated on September 12, 2024

What Is an Advanced Persistent Threat (APT)?

APTs are sophisticated, often long-term cyberattacks where attackers establish a foothold within a network and remain undetected for an extended period.

Image: Shutterstock / Built In
Sashank Purighalla Sashank Purighalla
Updated on September 04, 2024

How to Keep Your Cloud Migration From Becoming Dangerous

Cloud computing offers businesses ample benefits, but making the switch can introduce myriad risks. Our expert explains how to handle the shift safely.

Image: Shutterstock / Built In