Security Articles

Sorted By: Most Recent
Anton Chashchin Anton Chashchin
Updated on January 29, 2025

4 Fintech Trends That Buoyed the Industry in 2024

Despite a huge investment drop in recent years, fintech made a splash last year. Here’s what happened.

Image: Shutterstock / Built In
Dario Betti Dario Betti
Updated on January 28, 2025

7 Ways the Mobile Industry Will Evolve in 2025

With the new opportunities and challenges of 2025, will mobile companies be able to address emerging risks while embracing technological progress?

Image: Shutterstock / Built In
Minghong Fang Minghong Fang
Updated on January 24, 2025

Federated Learning Has Security Holes. Here’s How to Fix Them.

Our expert presents solutions to poisoning attacks in distributed machine learning, ensuring that privacy and efficiency can go hand-in-hand.

Image: Shutterstock / Built In
Sandra Matz Sandra Matz
Updated on January 22, 2025

The Case for Privacy by Design

Do you dream of a future where you can opt-in to share your data — instead of opting out? It could be closer than you think.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on January 16, 2025

Can Metadata Standards Like C2PA Fight Deepfakes?

The C2PA standard enables embedding metadata into images and other media content to verify the presence of AI.

Image: Shutterstock / Built In
Ellen Glover Ellen Glover
Updated on December 18, 2024

Online Privacy: What It Is and Tips for Protecting It

Online privacy refers to protecting one’s personal information while using the internet. These are the reasons why online privacy matters, threats to online privacy and essential tips for protecting one’s online privacy.

Image: Shutterstock
Taylor Rose Taylor Rose
Updated on December 16, 2024

‘Digital Risk is Human Risk’: Inside Nisos’ New Service of Human Risk Management  

Through its new service, managed intelligence company Nisos can help customers uncover their human-driven digital threats and vulnerabilities. 

Photo: Nisos 
Brand Studio Logo
Sean Tilley Sean Tilley
Updated on December 06, 2024

Everything You Need to Know About the 2025 Digital Operational Resilience Act

What is DORA, and how can you prepare for it?

Image: Shutterstock / Built In
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Tomer Filiba Tomer Filiba
Updated on November 25, 2024

3 Cloud Security Hacks to Prevent Hacks

When SecOps teams are stretched thin, here are three high impact ways DevOps teams can help them curb cloud risks.

Image: Shutterstock / Built In