Cybersecurity Articles

Sorted By: Most Recent
Mae Rice Mae Rice
Updated on April 15, 2024

8 Security Architecture Do’s and Don’ts From 3 Industry Experts

We asked three experts about what makes this tech field tick.

Neko Papez Neko Papez
Updated on April 15, 2024

Weaponized Files: The Latest Cybersecurity Threat Explained

Weaponized files are files that have been injected with malware to compromise devices and steal data. Learn how it works and how to stop it.  

Image: Shutterstock / Built In
Tammy Xu Tammy Xu
Updated on April 15, 2024

Cryptographers Are Racing Against Quantum Computers

Today’s security schemes will soon be obsolete.

Image: Shutterstock / Built In
David Balaban David Balaban
Updated on April 15, 2024

How to Protect Your System From Botnet Malware

A look into the present-day botnet ecosystem and best practices to thwart increasingly sophisticated attacks.

Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

MFA Fatigue: What It Is and How to Avoid It

MFA fatigue, also known as MFA abuse attacks, are a type of cyber threat that is on the rise. Familiarize yourself with the risks so you don’t fall victim.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

How to Build an Effective Cybersecurity Program for Your Business

Because of the increasing number of threats, every business needs a comprehensive cybersecurity program. Here are the most important components you need to include.

Stephen Gossett Stephen Gossett
Updated on April 15, 2024

4 Types of Insider Threats — and How to Minimize Them

Think gamified training, password managers and anomaly detection.

Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

SAST vs. DAST: What’s the Difference?

SAST and DAST are two methods for testing the security of a web application. Here are the key differences between them.,

Image: Shutterstock / Built In
Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on April 15, 2024

12 Penetration Testing Certification Options to Know

These cybersecurity credentials prove you're a hacker with a heart of gold.

Image: shutterstock
Brand Studio Logo