Cybersecurity Articles

Sorted By: Most Recent
Mustafa Suleyman Mustafa Suleyman
Updated on September 07, 2023

Can We Control Technology?

Understanding technology means understanding the unintended consequences of technological breakthroughs.

Image: Shutterstock / Built In
Reed McGinley-Stempel Reed McGinley-Stempel
Updated on September 05, 2023

AI Just Might Kill Your Company

But it doesn’t have to be today, next week or even next year. Think about your strategy and avoid knee-jerk reactions.

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on August 16, 2023

What Is Biometrics?

Biometrics authenticates identity by logging the way someone looks or how they behave.

Image: Shutterstock
Gordon Gottsegen Gordon Gottsegen
Updated on August 07, 2023

Machine Learning in Cybersecurity: How It Works and Companies to Know

Machine learning in cybersecurity is evolving to address new cyber threats, and these companies are leading the way with ML-based cybersecurity solutions.

Image: Shutterstock
Jeremy Bradley Jeremy Bradley
Updated on June 28, 2023

An Introduction to Homomorphic Encryption for Business Leaders

Homomorphic encryption allows companies to analyze sensitive data in an encrypted format to reduce potential security breaches. Here’s what to know.

Image: Shutterstock / Built In
Ken Cox Ken Cox
Updated on June 28, 2023

Why We Can’t Ignore the Dark Side of AI

As AI continues to evolve, it introduces greater security and data risks. Here’s what we need to do about it.  

Image: Shutterstock / Built In
Tammy Xu Tammy Xu
Updated on April 27, 2023

What Is Fuzz Testing? How Does It Work?

Fuzz testing can catch application errors that other testing tools miss. Here’s how it works and the types to know.

Image: Shutterstock
Tammy Xu Tammy Xu
Updated on April 19, 2023

How to Stop a DDoS Attack: A Guide

Take these steps to stop a DDoS attack from hurting your company.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 04, 2023

What Is LDAP (Lightweight Directory Access Protocol)?

Why do we use LDAP and how does it work? Our expert explains the ins and outs of the Lightweight Directory Access Protocol.

Image: Shutterstock / Built In
Abdishakur Hassan Abdishakur Hassan
Updated on March 28, 2023

What Is a Sandbox Environment?

We primarily use sandbox environments for web development and cybersecurity, but we’re also seeing them more in data science. Here’s what a sandbox environment is and how to set one up.

Image: Shutterstock / Built In