Cybersecurity + IT Articles

Sorted By: Most Recent
Aimei Wei Aimei Wei
Updated on September 10, 2025

3 Critical Cybersecurity Roles for the AI-Driven Future

AI is rapidly transforming the cybersecurity job landscape, creating increased demand for roles that require AI experience and less demand for entry-level roles. Here’s what to know. 

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on August 25, 2025

What Is Smishing?

Smishing (or SMS phishing) is a form of phishing where attackers use text messages to deceive individuals into sharing sensitive information, sending money or downloading malicious software.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on August 25, 2025

What Is a CDN (Content Delivery Network)?

A content delivery network (CDN) is a geographically distributed system of servers that cache and deliver web content to users based on their location to improve speed, reliability and security.

Image: Shutterstock / Built In
JP Perez-Etchegoyen JP Perez-Etchegoyen
Updated on August 22, 2025

The CISO’s AI Cybersecurity Survival Guide

AI is scrambling the cybersecurity ecosystem. Our expert offers 10 tips for CISOs to stay ahead of the threats.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on August 21, 2025

19 Top Cybersecurity Training Programs and Online Courses to Know

These courses cover everything from malware analysis to cloud security.

Image: Shutterstock
Brand Studio Logo
Andy Maus Andy Maus
Updated on August 18, 2025

Lessons From a Major Cyber Attack on a City Government

The recent ransomware attack on St. Paul, Minnesota underscores a larger pattern of cyber attacks affecting municipalities across the U.S. Here’s what can be done about it. 

Image: Shutterstock / Built In
Mike Hyzy Mike Hyzy
Updated on August 12, 2025

What Is Threatcasting?

Threatcasting is a strategic method for anticipating and mitigating risks a decade in advance. Our expert offers an introduction.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on August 07, 2025

Security Fundamentals for WordPress Sites

WordPress sites have some intrinsic vulnerabilities that make them tempting targets for attackers. Our expert offers tips on staying safe.

Image: Shutterstock / Built In
Russ Munisteri Russ Munisteri
Updated on July 30, 2025

Laid Off From IT? How to Transfer to a Cybersecurity Role.

Cybersecurity careers are often a perfect fit for IT professionals thanks to its mix of growth opportunities and similar skill sets. Here’s how to make the leap.   

Image: Shutterstock / Built In
David Montoya David Montoya
Updated on July 29, 2025

The Uptime Cybersecurity Gap: Why Companies Must Close It Before It’s Too Late

Legacy systems and outdated infrastructure pose significant security risks for companies reliant on uptime operations. Here’s how they can close the uptime security gap. 

Image: Shutterstock / Built In