Cybersecurity Articles

Sorted By: Most Recent
Daniel Pearson Daniel Pearson
Updated on September 30, 2025

How to Prevent Piggybacking Attacks in Your Network

Piggybacking attacks occur when a user exploits trust to breach physical or digital security to access sensitive data, install malware or compromise the system. Here’s how to prevent it.    

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on September 24, 2025

Age Verification Is Taking Over the Internet — But at What Cost?

A recent Supreme Court decision has unleashed a torrent of state-level age verification laws in America, igniting debate over whether protecting kids online should come at the expense of privacy and free expression for adults.

Image: Shutterstock
Katlyn Gallo Katlyn Gallo
Updated on September 22, 2025

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control (DAC) is a security model where the owner of a resource grants users permission to access that resource.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on September 18, 2025

What Is Cryptography?

Cryptography is the study of secure communication and protecting information by converting it into an unreadable format, ensuring confidentiality, integrity, authenticity and non-repudiation in digital systems.

Image: Shutterstock / Built In
Steve Wilson Steve Wilson
Updated on September 17, 2025

What Hollywood’s AI Horror Stories Tell Us About Safety vs. Security

Two recent movies illustrate the various risks that may accompany the widespread adoption of AI.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on September 16, 2025

35 Top Cloud Security Companies to Know

Cybersecurity for the cloud is important for your business. Here are companies that specialize in it.

Image: Shutterstock
Murali Sastry Murali Sastry
Updated on September 15, 2025

How to Vibe Code Without Creating Security Problems

As vibe coding becomes common practice for developers, these best practices will help keep your products safe.

Image Shutterstock / Built In
Dawn Kawamoto Dawn Kawamoto
Updated on September 15, 2025

Your Pathway Into a Cybersecurity Job Is Changing

An increasing number of Gen Z and millennials are going beyond the traditional IT-to-cybersecurity career path. Should you?

Julius Černiauskas Julius Černiauskas
Updated on September 11, 2025

Why Information Sharing Is Crucial to Better Cybersecurity

Cybercriminals have developed sophisticated collaboration networks. Stopping them will require businesses to do the same.

Image: Shutterstock / Built In
Aimei Wei Aimei Wei
Updated on September 10, 2025

3 Critical Cybersecurity Roles for the AI-Driven Future

AI is rapidly transforming the cybersecurity job landscape, creating increased demand for roles that require AI experience and less demand for entry-level roles. Here’s what to know. 

Image: Shutterstock / Built In