Cybersecurity Articles

Sorted By: Most Recent
Alyssa Schroer Alyssa Schroer
Updated on June 27, 2025

AI Cybersecurity: 22 Companies to Know

These AI cybersecurity solutions save time and money by providing IT and security teams with tools to protect data and networks against cyber attacks.

Image: Shutterstock
Katlyn Gallo Katlyn Gallo
Updated on June 27, 2025

What Is SSO?

SSO (single sign-on) is a method of authentication that uses one set of credentials to authenticate to one or more applications.

Image: Shutterstock / Built In
Mike Thomas Mike Thomas
Updated on June 26, 2025

52 Top Cybersecurity Companies to Know

These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.

Image: Shutterstock
Ellen Glover Ellen Glover
Updated on June 26, 2025

Facial Recognition, Explained

Facial recognition uses AI and biometric data to identify individuals by their unique facial features. Learn how the technology works, where it’s used and the benefits and disadvantages — including its ethical concerns.

Image: Shutterstock
Mae Rice Mae Rice
Updated on June 25, 2025

34 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock
Gordon Gottsegen Gordon Gottsegen
Updated on June 25, 2025

20 Publicly Traded Cybersecurity Companies to Follow

In our digitally hyperconnected world, cybersecurity companies are more in demand than ever. We’ve rounded up 18 publicly traded ones.

Image: Shutterstock
Toni de la Fuente Toni de la Fuente
Updated on June 25, 2025

The Hidden Cost of Cloud Complexity and the Open Path Forward

Multi-cloud solutions can add unnecessary complexity that can increase security challenges. Here’s how open cloud security can help shore up those risks.

Image: Shutterstock / Built In
Abdishakur Hassan Abdishakur Hassan
Updated on June 24, 2025

What Is a Sandbox Environment?

A sandbox environment is a controlled, isolated space where developers can safely test software, configurations or code changes without affecting live systems. It mirrors aspects of the production environment but prevents unintended consequences.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on June 17, 2025

What Is PHI (Protected Health Information)?

PHI (protected health information) is data collected about patients. Here’s what counts as PHI and why it’s important to protect.

Image: Shutterstock / Built In
Isaac Evans Isaac Evans
Updated on June 16, 2025

Why Developer-First Security Is About Guardrails, Not Gates

Despite the promises of the “shift left,” how security is implemented is far more important than when. Our expert lays our a vision for a developer-first security posture based on guardrails, not gates..

Image: Shutterstock / Built In