Cybersecurity Frameworks Articles

Sorted By: Most Recent
Mae Rice Mae Rice
Updated on June 25, 2025

34 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock
Toni de la Fuente Toni de la Fuente
Updated on June 25, 2025

The Hidden Cost of Cloud Complexity and the Open Path Forward

Multi-cloud solutions can add unnecessary complexity that can increase security challenges. Here’s how open cloud security can help shore up those risks.

Image: Shutterstock / Built In
Isaac Evans Isaac Evans
Updated on June 16, 2025

Why Developer-First Security Is About Guardrails, Not Gates

Despite the promises of the “shift left,” how security is implemented is far more important than when. Our expert lays our a vision for a developer-first security posture based on guardrails, not gates..

Image: Shutterstock / Built In
Kumar Goswami Kumar Goswami
Updated on June 13, 2025

You’re Probably Ignoring a Vulnerability That Could Cost You Millions in Ransomware Attacks

Companies often forget to protect unstructured file data, which makes it an ideal attack surface. Our expert tells you how to stay safe.

Image: Shutterstock / Built In
Éireann Leverett Éireann Leverett
Updated on June 05, 2025

How Cybersecurity Teams Can Stay Ahead in 2025 and Beyond

Chat logs from cyber threat group Black Basta reveal that a company’s greatest vulnerability is its overlooked infrastructure. Here’s what that means for cybersecurity defense.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on May 27, 2025

Best Practices for Secure Kotlin App Development

As Kotlin is quickly becoming a popular and highly paid language, our expert shares some tips for building secure products with it.

Image: Shutterstock / Built In
Giorgos Myrianthous Giorgos Myrianthous
Updated on May 20, 2025

What Is Prompt Injection?

Prompt injection is a cyberattack that takes advantage of the greatest strength of an LLM: Its ability to understand natural language. Our expert details how it works and how to guard against it.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on May 05, 2025

What Is Screen Hacking?

Our expert explains the newest cybersecurity threat and how to keep your devices safe.

Image: Shutterstock / Built In
Erin Hamm Erin Hamm
Updated on March 17, 2025

The Crawl-Walk-Run Approach to Generative AI Security

Rushing to adopt the latest generative AI security tools can create larger problems in the future. Here’s why a slower, simpler approach is better. 

Image: Shutterstock / Built In
Chintan Parikh Chintan Parikh
Updated on March 10, 2025

Understanding the Hidden Risks of AI Agent Adoption

AI agents promise to automate tasks and enhance efficiency, however they can also present unique security vulnerabilities. Here’s what to know.

Image: Shutterstock / Built In