Cybersecurity Articles

Sorted By: Most Recent
Mae Rice Mae Rice
Updated on April 15, 2024

12 Penetration Testing Certification Options to Know

These cybersecurity credentials prove you're a hacker with a heart of gold.

Image: shutterstock
Brand Studio Logo
Stephen Gossett Stephen Gossett
Updated on April 12, 2024

What Every Developer Should Know About Threat Modeling

You might be doing it already without even realizing it.

Tammy Xu Tammy Xu
Updated on April 10, 2024

What Do Security Incident Response Team (SIRT) Engineers Do?

SIRT engineering is a high-pressure job, but for the right person, it can be really rewarding.

John Funk John Funk
Updated on April 09, 2024

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 09, 2024

13 Tips to Secure Your Company’s Social Media Accounts

No one is safe from social media cyber attacks. Take these steps to keep your company’s accounts safe.

Image: Shutterstock / Built In
Alexandria Jacobson Alexandria Jacobson
Updated on April 09, 2024

What Is a Phishing Attack? (With 18 Examples)

Fraudsters are posing as trusted people via phone calls, text messages and emails to trick victims into sharing personal or sensitive information.

Image: Shutterstock
Mitchell Telatnik Mitchell Telatnik
Updated on April 09, 2024

What Is Penetration Testing?

Wondering how to improve your cybersecurity posture? Hiring a penetration tester is just the beginning.

Image: Shutterstock
Mike Thomas Mike Thomas
Updated on April 09, 2024

White Hat Hackers: Inside the World of Ethical Hacking

Companies have long played defense against cyber attacks. With the help of ethical hackers, they're taking more proactive measures.

Mike Thomas Mike Thomas
Updated on April 09, 2024

What Is Social Engineering? A Look Into the Sophisticated World of Psychological Cyber Crime.

How tech-savvy scammers use social engineering to swindle corporations and grandma.

Image: Shutterstock
Mike Thomas Mike Thomas
Updated on April 09, 2024

13 IoT Security Companies You Should Know

Check out the companies providing security for IoT technology.

Image: Shutterstock