Cybersecurity + IT Articles

Sorted By: Most Recent
Ray Canzanese Ray Canzanese
Updated on December 23, 2025

AI Browsers Are Here. Is Your Security Team Ready?

AI browsers offer a host of benefits that makes them useful, but they likewise introduce a range of new security risks.

Image: Shutterstock / Built In
Charlie Sander Charlie Sander
Updated on December 15, 2025

AI-Powered Deepfake Attacks Are Hitting Schools Hard. Here’s How to Protect Students.

The increasing sophistication of deepfake cyberthreats is putting schools at risk. Here’s how we stop them before they start.

Image: Shutterstock / Built In
Lisa Bertagnoli Lisa Bertagnoli
Updated on December 08, 2025

Need Tech Talent? Look Beyond Computer Science Degrees.

Apprentices and nontraditional candidates add a fresh perspective to tech teams, plus help with diversity and recruiting.

Bailey Reiners Bailey Reiners
Updated on December 04, 2025

Cyber Security Recruitment: What You Need To Know

Take a deep dive into the data behind Cyber Security recruiting.

Margo Steines Margo Steines
Updated on November 06, 2025

23 Companies Hiring Entry-Level IT Professionals

Entry-level IT professionals can work across a variety of industries, ranging from financial services to pharmaceutical manufacturing.

Photo: Shutterstock
Alex Vakulov Alex Vakulov
Updated on November 06, 2025

How to Improve Your Cloud Security in 2026

As multicloud deployments become more common, security threats are amplified. Our expert outlines how to stay ahead of the risks.

Image: Shutterstock / Built In
Kevin Tian Kevin Tian
Updated on November 04, 2025

How to Spot and Avoid Fake Job Offers Before They Cost You

Scammers are taking advantage of high unemployment to deploy increasingly sophisticated scams. Our expert has advice for staying safe.

Image: Shutterstock / Built In
Mark Flegg Mark Flegg
Updated on October 29, 2025

Addressing the Security Risks of Decentralized Domain Management

A lack of coordination around domain management can expose an organization’s cybersecurity risk, yet it often gets overlooked. Here’s what you can do about it.

Image: Shutterstock / Built In
Daniel Pearson Daniel Pearson
Updated on September 30, 2025

How to Prevent Piggybacking Attacks in Your Network

Piggybacking attacks occur when a user exploits trust to breach physical or digital security to access sensitive data, install malware or compromise the system. Here’s how to prevent it.    

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on September 22, 2025

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control (DAC) is a security model where the owner of a resource grants users permission to access that resource.

Image: Shutterstock / Built In