Cybersecurity Articles

Sorted By: Most Recent
Adam Ierymenko Adam Ierymenko
Updated on November 01, 2024

The Shift To Memory-Safe Code Is Coming for Your Industry

The pervasive use of memory-unsafe languages in vital systems is exposing them to vulnerabilities. Our expert explains why that’s a problem.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on October 30, 2024

What Is Cybersecurity?

Cybersecurity is the practice of using experts and tools as a multi-layered defense to protect networks, systems, hardware and data from digital attacks.

Image: Shutterstock
Alyssa Schroer Alyssa Schroer
Updated on October 29, 2024

12 Top Mobile Security Companies Safeguarding Our Devices

Here are the companies striving to keep our data and devices safe.

Sascha Giese Sascha Giese
Updated on October 09, 2024

How to Exorcise the Modern Horrors of IT

Your average IT team faces as many shadowy monsters as a camper in a horror movie. Our expert gives you some tools to battle back against them.

Image: Shutterstock / Built In
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In
Nazy Fouladirad Nazy Fouladirad
Updated on October 01, 2024

So, You’ve Been Hacked. Now What?

Cyber attacks can happen to any company. Here’s what to do after a breach and how to protect your business against another one.

Image: Shutterstock / Built In
Ian Paterson Ian Paterson
Updated on October 01, 2024

Here’s How Behavioral Biometrics Can Boost Security

Behavioral biometrics use employees’ unique behaviors to reduce cyberthreats.

Image: Shutterstock / Built In
Margo Steines Margo Steines
Updated on September 25, 2024

6 Companies Hiring Ethical Hackers

These companies use a range of cybersecurity tools and approaches to prevent hackers and malware from getting through

Photo: Shutterstock
Mark Weinstein Mark Weinstein
Updated on September 24, 2024

How to Keep Kids Safe Online Without Banning Encryption

While encryption may be the final frontier of digital privacy, it’s also rife with abuse. Here’s how to balance privacy with safety.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on September 12, 2024

Understanding ISO 42001: A Framework for Responsible AI

ISO 42001 controls and policies form the first international AI management system standard. Here's what you need to know.

Image: Shutterstock