Cybersecurity Articles

Sorted By: Most Recent
Judith Etugbo Judith Etugbo
Updated on January 31, 2025

Why Multi-Signature Crypto Wallets Are Crucial for Blockchain Security

A multi-signature crypto wallet is a form of crypto security that requires at least two or more passkeys from different cosigners to unlock. Here’s how they work.

Image: Shutterstock / Built In
Ellen Glover Ellen Glover
Updated on January 29, 2025

21 Encryption Solution Companies to Know

With the power of encryption, these companies are keeping the world’s data safe.

Image: Shutterstock / Built in
Katlyn Gallo Katlyn Gallo
Updated on January 27, 2025

What Is Hashing? A Guide With Examples.

Hashing uses an algorithm to transform input data of any size into a value of fixed length that is extremely difficult to decode. Here’s how hashing is used, its benefits and downsides and why it matters in cybersecurity.

Image: Shutterstock / Built In
Minghong Fang Minghong Fang
Updated on January 24, 2025

Federated Learning Has Security Holes. Here’s How to Fix Them.

Our expert presents solutions to poisoning attacks in distributed machine learning, ensuring that privacy and efficiency can go hand-in-hand.

Image: Shutterstock / Built In
Tracy Pitcher Tracy Pitcher
Updated on January 23, 2025

3 Tech Trends to Know for 2025

From disinformation security to 6G, these are the tech trends that are poised to have the biggest impact in 2025. Our expert explains why.

Image: Shutterstock / Built In
Sandra Matz Sandra Matz
Updated on January 22, 2025

The Case for Privacy by Design

Do you dream of a future where you can opt-in to share your data — instead of opting out? It could be closer than you think.

Image: Shutterstock / Built In
Carsten Rhod Gregersen Carsten Rhod Gregersen
Updated on January 17, 2025

More Endpoints, More Problems. Here’s How IoT Can (and Should) Fight Back in 2025.

Great growth demands great responsibility in IoT. Let’s make sure devices deliver on their promise without compromising our security.

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on January 02, 2025

What Is Cryptojacking?

Cryptojackers aren’t targeting your data or looking to harm your computer. Instead, they’re after your processing power, quietly siphoning it to mine cryptocurrency undetectably in the background.

Image naming convention: Image: Shutterstock
Daniel Pearson Daniel Pearson
Updated on December 19, 2024

The Rise and Risks of Quantum Computing in 2025

While quantum computing promises unparalleled computational power, it will also introduce new cybersecurity risks. Here’s how to prepare.

Image: Shutterstock / Built In
Chris Gibson Chris Gibson
Updated on December 19, 2024

How AI Is Transforming Cyber Threats in 2025

AI is poised to reshape both cybersecurity and cyber attacks in 2025. Here’s what to expect and how to prepare.

Image: Shutterstock / Built In