Cybersecurity Articles

Sorted By: Most Recent
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

What Is SSO?

SSO (single sign-on) is a method of authentication that uses one set of credentials to authenticate to one or more applications.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 15, 2024

What Is Cybersecurity Incident Response and Handling?

Incident response refers to the overall cybersecurity process for responding to cyberattacks and data breaches, including all techniques attempted to contain the threat, reduce damage and mitigate consequences.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

What Is a DDoS Attack?

In a DDoS attack, multiple computers are used to target a resource. The desired outcome is to crash the target server, rendering it unable to process requests. 

Image: Shutterstock / Built In
Stephen Gossett Stephen Gossett
Updated on April 12, 2024

What Every Developer Should Know About Threat Modeling

You might be doing it already without even realizing it.

Tammy Xu Tammy Xu
Updated on April 10, 2024

What Do Security Incident Response Team (SIRT) Engineers Do?

SIRT engineering is a high-pressure job, but for the right person, it can be really rewarding.

Katlyn Gallo Katlyn Gallo
Updated on April 10, 2024

What Is PHI?

PHI (protected or personal health information) is data collected about patients. Here’s what counts as PHI and why it’s important to protect.

Image: Shutterstock / Built In
John Funk John Funk
Updated on April 09, 2024

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 09, 2024

13 Tips to Secure Your Company’s Social Media Accounts

No one is safe from social media cyber attacks. Take these steps to keep your company’s accounts safe.

Image: Shutterstock / Built In
Alexandria Jacobson Alexandria Jacobson
Updated on April 09, 2024

What Is a Phishing Attack? (With 18 Examples)

Fraudsters are posing as trusted people via phone calls, text messages and emails to trick victims into sharing personal or sensitive information.

Image: Shutterstock
Mitchell Telatnik Mitchell Telatnik
Updated on April 09, 2024

What Is Penetration Testing?

Wondering how to improve your cybersecurity posture? Hiring a penetration tester is just the beginning.

Image: Shutterstock