Cybersecurity Articles

Sorted By: Most Recent
Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on April 15, 2024

12 Penetration Testing Certification Options to Know

These cybersecurity credentials prove you're a hacker with a heart of gold.

Image: shutterstock
Brand Studio Logo
Anthony Corbo Anthony Corbo
Updated on April 15, 2024

What Is Cybersecurity Incident Response and Handling?

Incident response refers to the overall cybersecurity process for responding to cyberattacks and data breaches, including all techniques attempted to contain the threat, reduce damage and mitigate consequences.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

What Is a DDoS Attack?

In a DDoS attack, multiple computers are used to target a resource. The desired outcome is to crash the target server, rendering it unable to process requests. 

Image: Shutterstock / Built In
Stephen Gossett Stephen Gossett
Updated on April 12, 2024

What Every Developer Should Know About Threat Modeling

You might be doing it already without even realizing it.

Tammy Xu Tammy Xu
Updated on April 10, 2024

What Do Security Incident Response Team (SIRT) Engineers Do?

SIRT engineering is a high-pressure job, but for the right person, it can be really rewarding.

John Funk John Funk
Updated on April 09, 2024

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 09, 2024

13 Tips to Secure Your Company’s Social Media Accounts

No one is safe from social media cyber attacks. Take these steps to keep your company’s accounts safe.

Image: Shutterstock / Built In
Alexandria Jacobson Alexandria Jacobson
Updated on April 09, 2024

What Is a Phishing Attack? (With 18 Examples)

Fraudsters are posing as trusted people via phone calls, text messages and emails to trick victims into sharing personal or sensitive information.

Image: Shutterstock
Mitchell Telatnik Mitchell Telatnik
Updated on April 09, 2024

What Is Penetration Testing?

Wondering how to improve your cybersecurity posture? Hiring a penetration tester is just the beginning.

Image: Shutterstock