Cybersecurity Articles

Sorted By: Most Recent
Mark Flegg Mark Flegg
Updated on October 29, 2025

Addressing the Security Risks of Decentralized Domain Management

A lack of coordination around domain management can expose an organization’s cybersecurity risk, yet it often gets overlooked. Here’s what you can do about it.

Image: Shutterstock / Built In
Ken Jon Miyachi Ken Jon Miyachi
Updated on October 20, 2025

Deepfakes Are About to Break the Social Contract

Increasingly sophisticated synthetic media threatens to destroy our shared social reality. Here’s how we can stop the rupture.

Image: Shutterstock / Built In
Marc Frankel Marc Frankel
Updated on October 15, 2025

Why AI Coding Tools Are Your Security Team’s Worst Nightmare

AI coding tools are now the norm for most developer teams, however, security measures have failed to keep up. Here’s why that could be a significant problem and what to do about it.  

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on October 09, 2025

19 Network Security Companies Keeping Our Information Safe

These network security companies are working to protect our information from data breaches.

Image: Shutterstock
Gordon Gottsegen Gordon Gottsegen
Updated on October 02, 2025

13 Publicly Traded Cybersecurity Companies to Follow

In our digitally hyperconnected world, cybersecurity companies are more in demand than ever — these are the top publicly traded cybersecurity companies to know.

Image: Shutterstock
Daniel Pearson Daniel Pearson
Updated on September 30, 2025

How to Prevent Piggybacking Attacks in Your Network

Piggybacking attacks occur when a user exploits trust to breach physical or digital security to access sensitive data, install malware or compromise the system. Here’s how to prevent it.    

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on September 24, 2025

Age Verification Is Taking Over the Internet — But at What Cost?

A recent Supreme Court decision has unleashed a torrent of state-level age verification laws in America, igniting debate over whether protecting kids online should come at the expense of privacy and free expression for adults.

Image: Shutterstock
Katlyn Gallo Katlyn Gallo
Updated on September 22, 2025

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control (DAC) is a security model where the owner of a resource grants users permission to access that resource.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on September 18, 2025

What Is Cryptography?

Cryptography is the study of secure communication and protecting information by converting it into an unreadable format, ensuring confidentiality, integrity, authenticity and non-repudiation in digital systems.

Image: Shutterstock / Built In
Steve Wilson Steve Wilson
Updated on September 17, 2025

What Hollywood’s AI Horror Stories Tell Us About Safety vs. Security

Two recent movies illustrate the various risks that may accompany the widespread adoption of AI.

Image: Shutterstock / Built In