Cybersecurity Articles

Sorted By: Most Recent
Alex Vakulov Alex Vakulov
Updated on June 04, 2024

How to Attract, Train and Retain Blue Team Cybersecurity Talent

Cybersecurity teams need a good defense. Here’s how to find the players.

Image: Shutterstock / Built In
Gavin Quinn Gavin Quinn
Updated on May 30, 2024

Is Your CEO’s Social Media Presence Putting Your Company at Risk?

Social media is often a threat actor’s first stop, and no account is at more risk than a CEOs. Here’s how CEOs can protect their social media accounts and companies from cyber attacks.

Image: Shutterstock / Built In
Khurram Mir Khurram Mir
Updated on May 14, 2024

Can Rogue AI Become a Threat to Cybersecurity?

Without human intelligence, it sure can. Our expert explains why prevention is the best cure.

Image: Shutterstock / Built In
Charath Ranganathan Charath Ranganathan
Updated on May 14, 2024

Why Your Company Should Be Using CodeOps

CodeOps is a new and improved way to secure your development process.

Image: Shutterstock / Built In
Will Teevan Will Teevan
Updated on May 14, 2024

Unpatched Software Is a Huge Cybersecurity Risk. Here’s How to Address It.

Software patching is a quick, inexpensive way to prevent cyber attacks.

Image: Shutterstock / Built In
Brian Nordli Brian Nordli
Updated on May 10, 2024

What Is a Digital Footprint?

There’s no such thing as online privacy. But here's how you can limit your exposure.

Image: Shutterstock
Dinesh Kumar K.B. Dinesh Kumar K.B.
Updated on May 07, 2024

JWT Decoded: A Guide

JSON web token (JWT) is an open standard used to safely share encrypted information between a client and a server. Learn how to decode JWT using Python.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on May 07, 2024

How to Use Nmap to Scan for Open Ports

This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In
Jenny Lyons-Cunha Jenny Lyons-Cunha
Updated on April 26, 2024

Cybersecurity Is For Everyone: Three Women Leading the Charge at Prove

From hacker flicks to contemporary inclusion practices, three women talk about life at Prove.

Shutterstock
Brand Studio Logo