Cybersecurity Incident Response + Handling Articles

Sorted By: Most Recent
Daniel Pearson Daniel Pearson
Updated on September 30, 2025

How to Prevent Piggybacking Attacks in Your Network

Piggybacking attacks occur when a user exploits trust to breach physical or digital security to access sensitive data, install malware or compromise the system. Here’s how to prevent it.    

Image: Shutterstock / Built In
Steve Wilson Steve Wilson
Updated on September 17, 2025

What Hollywood’s AI Horror Stories Tell Us About Safety vs. Security

Two recent movies illustrate the various risks that may accompany the widespread adoption of AI.

Image: Shutterstock / Built In
Murali Sastry Murali Sastry
Updated on September 15, 2025

How to Vibe Code Without Creating Security Problems

As vibe coding becomes common practice for developers, these best practices will help keep your products safe.

Image Shutterstock / Built In
Dawn Kawamoto Dawn Kawamoto
Updated on September 15, 2025

Your Pathway Into a Cybersecurity Job Is Changing

An increasing number of Gen Z and millennials are going beyond the traditional IT-to-cybersecurity career path. Should you?

Julius Černiauskas Julius Černiauskas
Updated on September 11, 2025

Why Information Sharing Is Crucial to Better Cybersecurity

Cybercriminals have developed sophisticated collaboration networks. Stopping them will require businesses to do the same.

Image: Shutterstock / Built In
JP Perez-Etchegoyen JP Perez-Etchegoyen
Updated on August 22, 2025

The CISO’s AI Cybersecurity Survival Guide

AI is scrambling the cybersecurity ecosystem. Our expert offers 10 tips for CISOs to stay ahead of the threats.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on August 21, 2025

19 Top Cybersecurity Training Programs and Online Courses to Know

These courses cover everything from malware analysis to cloud security.

Image: Shutterstock
Brand Studio Logo
Andy Maus Andy Maus
Updated on August 18, 2025

Lessons From a Major Cyber Attack on a City Government

The recent ransomware attack on St. Paul, Minnesota underscores a larger pattern of cyber attacks affecting municipalities across the U.S. Here’s what can be done about it. 

Image: Shutterstock / Built In
Mike Hyzy Mike Hyzy
Updated on August 12, 2025

What Is Threatcasting?

Threatcasting is a strategic method for anticipating and mitigating risks a decade in advance. Our expert offers an introduction.

Image: Shutterstock / Built In
Mike Mitchell Mike Mitchell
Updated on July 22, 2025

4 Essential Skills for Cyber Threat-Hunting Teams

The rise of stealthy cybersecurity threats demands a new set of skills. So, what should CISOs look for when hiring?

Image: Shutterstock / Built In