Security Articles

Sorted By: Most Recent
Sandra Matz Sandra Matz
Updated on January 22, 2025

The Case for Privacy by Design

Do you dream of a future where you can opt-in to share your data — instead of opting out? It could be closer than you think.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on January 16, 2025

Can Metadata Standards Like C2PA Fight Deepfakes?

The C2PA standard enables embedding metadata into images and other media content to verify the presence of AI.

Image: Shutterstock / Built In
Ellen Glover Ellen Glover
Updated on December 18, 2024

Online Privacy: What It Is and Tips for Protecting It

Online privacy refers to protecting one’s personal information while using the internet. These are the reasons why online privacy matters, threats to online privacy and essential tips for protecting one’s online privacy.

Image: Shutterstock
Taylor Rose Taylor Rose
Updated on December 16, 2024

‘Digital Risk is Human Risk’: Inside Nisos’ New Service of Human Risk Management  

Through its new service, managed intelligence company Nisos can help customers uncover their human-driven digital threats and vulnerabilities. 

Photo: Nisos 
Brand Studio Logo
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Tomer Filiba Tomer Filiba
Updated on November 25, 2024

3 Cloud Security Hacks to Prevent Hacks

When SecOps teams are stretched thin, here are three high impact ways DevOps teams can help them curb cloud risks.

Image: Shutterstock / Built In
Brandon Wiebe Brandon Wiebe
Updated on November 08, 2024

Does Your Organization Need a Field Chief Privacy Officer?

The field CPO is the connective tissue between companies, focused on education, advocacy and community. Here’s what to know if you’re thinking of hiring for the role.

Image: Shutterstock / Built In
James Boyle James Boyle
Updated on October 22, 2024

Is AI on Its Way to Gaining Rights?

No, it’s not science fiction. Here’s what we can expect from looking at how corporations have gained personhood.

Image: Shutterstock / Built In
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In