Cybersecurity Articles

Sorted By: Most Recent
Jeremy Bradley Jeremy Bradley
Updated on June 28, 2023

An Introduction to Homomorphic Encryption for Business Leaders

Homomorphic encryption allows companies to analyze sensitive data in an encrypted format to reduce potential security breaches. Here’s what to know.

Image: Shutterstock / Built In
Ken Cox Ken Cox
Updated on June 28, 2023

Why We Can’t Ignore the Dark Side of AI

As AI continues to evolve, it introduces greater security and data risks. Here’s what we need to do about it.  

Image: Shutterstock / Built In
Tammy Xu Tammy Xu
Updated on April 27, 2023

What Is Fuzz Testing? How Does It Work?

Fuzz testing can catch application errors that other testing tools miss. Here’s how it works and the types to know.

Image: Shutterstock
Tammy Xu Tammy Xu
Updated on April 19, 2023

How to Stop a DDoS Attack: A Guide

Take these steps to stop a DDoS attack from hurting your company.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 04, 2023

What Is LDAP (Lightweight Directory Access Protocol)?

Why do we use LDAP and how does it work? Our expert explains the ins and outs of the Lightweight Directory Access Protocol.

Image: Shutterstock / Built In
Abdishakur Hassan Abdishakur Hassan
Updated on March 28, 2023

What Is a Sandbox Environment?

We primarily use sandbox environments for web development and cybersecurity, but we’re also seeing them more in data science. Here’s what a sandbox environment is and how to set one up.

Image: Shutterstock / Built In
Estefanía García Gallardo Estefanía García Gallardo
Updated on March 28, 2023

What Is File Transfer Protocol (FTP)?

File transfer protocol has been around for many years and is largely used to share files over the internet. Here’s how it works and why we still use it.

Image: Shutterstock / Built In
Bailey Reiners Bailey Reiners
Updated on March 15, 2023

Cyber Security Recruitment: What You Need To Know

Take a deep dive into the data behind Cyber Security recruiting.

Tammy Xu Tammy Xu
Updated on March 15, 2023

API Security 101

A breakdown of the pros and cons of OAuth, basic auth and mutual TLS.

Tammy Xu Tammy Xu
Updated on March 15, 2023

DevSecOps Makes Cybersecurity More Agile

But it’s as much about mindset as it is automating security processes.