Cybersecurity Articles

Sorted By: Most Recent
Brian Nordli Brian Nordli
Updated on August 27, 2025

Cybersecurity Tips for Protecting Your Newly Remote Team

As companies go remote, cybersecurity threats are on the rise. Here’s how to keep your team — and your data — safe.

Anthony Corbo Anthony Corbo
Updated on August 26, 2025

What Is Cloud Security?

Cloud security refers to measures taken to protect data, infrastructure, applications and the integrity of cloud environments.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on August 25, 2025

What Is Spear Phishing?

Spear phishing is a type of phishing attack where cybercriminals impersonate trusted sources to deceive individuals into revealing sensitive data or downloading malware.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on August 25, 2025

What Is SQL Injection?

SQL injection is a code injection cyber attack that allows an attacker to manipulate a database by inserting malicious SQL statements into an application’s input fields.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on August 25, 2025

What Is a DDoS Attack?

A distributed denial-of-service (DDoS) attack is a cyber attack that uses multiple compromised devices to overwhelm a system with traffic, disrupting access to its services.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on August 25, 2025

What Is Smishing?

Smishing (or SMS phishing) is a form of phishing where attackers use text messages to deceive individuals into sharing sensitive information, sending money or downloading malicious software.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on August 25, 2025

What Is a CDN (Content Delivery Network)?

A content delivery network (CDN) is a geographically distributed system of servers that cache and deliver web content to users based on their location to improve speed, reliability and security.

Image: Shutterstock / Built In
JP Perez-Etchegoyen JP Perez-Etchegoyen
Updated on August 22, 2025

The CISO’s AI Cybersecurity Survival Guide

AI is scrambling the cybersecurity ecosystem. Our expert offers 10 tips for CISOs to stay ahead of the threats.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on August 21, 2025

19 Top Cybersecurity Training Programs and Online Courses to Know

These courses cover everything from malware analysis to cloud security.

Image: Shutterstock
Brand Studio Logo
Anthony Corbo Anthony Corbo
Updated on August 21, 2025

What Is Ethical Hacking?

Ethical hacking is an offensive-focused security investigation used to identify and identify and safely test cybersecurity vulnerabilities within an IT environment.

Image: Shutterstock / Built In