Cybersecurity Incident Response + Handling Articles

Sorted By: Most Recent
JP Perez-Etchegoyen JP Perez-Etchegoyen
Updated on August 22, 2025

The CISO’s AI Cybersecurity Survival Guide

AI is scrambling the cybersecurity ecosystem. Our expert offers 10 tips for CISOs to stay ahead of the threats.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on August 21, 2025

19 Top Cybersecurity Training Programs and Online Courses to Know

These courses cover everything from malware analysis to cloud security.

Image: Shutterstock
Brand Studio Logo
Andy Maus Andy Maus
Updated on August 18, 2025

Lessons From a Major Cyber Attack on a City Government

The recent ransomware attack on St. Paul, Minnesota underscores a larger pattern of cyber attacks affecting municipalities across the U.S. Here’s what can be done about it. 

Image: Shutterstock / Built In
Mike Hyzy Mike Hyzy
Updated on August 12, 2025

What Is Threatcasting?

Threatcasting is a strategic method for anticipating and mitigating risks a decade in advance. Our expert offers an introduction.

Image: Shutterstock / Built In
Mike Mitchell Mike Mitchell
Updated on July 22, 2025

4 Essential Skills for Cyber Threat-Hunting Teams

The rise of stealthy cybersecurity threats demands a new set of skills. So, what should CISOs look for when hiring?

Image: Shutterstock / Built In
Alex Ferrer Alex Ferrer
Updated on July 17, 2025

6 Crypto Fraud Trends to Know and How to Spot Them

Crypto fraud has transformed from a fringe threat to a mainstream crisis. Here’s what to look out for and how to prevent it. 

Image: Shutterstock / Built In
Kumar Goswami Kumar Goswami
Updated on June 13, 2025

You’re Probably Ignoring a Vulnerability That Could Cost You Millions in Ransomware Attacks

Companies often forget to protect unstructured file data, which makes it an ideal attack surface. Our expert tells you how to stay safe.

Image: Shutterstock / Built In
Éireann Leverett Éireann Leverett
Updated on June 05, 2025

How Cybersecurity Teams Can Stay Ahead in 2025 and Beyond

Chat logs from cyber threat group Black Basta reveal that a company’s greatest vulnerability is its overlooked infrastructure. Here’s what that means for cybersecurity defense.

Image: Shutterstock / Built In
Giorgos Myrianthous Giorgos Myrianthous
Updated on May 20, 2025

What Is Prompt Injection?

Prompt injection is a cyberattack that takes advantage of the greatest strength of an LLM: Its ability to understand natural language. Our expert details how it works and how to guard against it.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on May 05, 2025

What Is Screen Hacking?

Our expert explains the newest cybersecurity threat and how to keep your devices safe.

Image: Shutterstock / Built In