Cybersecurity Articles

Sorted By: Most Recent
David Derigiotis David Derigiotis
Updated on October 11, 2023

Frustrated with Your Insurance Company? AI Could Help.

From automated risk assessments to enhanced fraud protection, will AI bring the traditional insurance industry into the future?

Image: Shutterstock / Built In
Tamas Kadar Tamas Kadar
Updated on September 27, 2023

AI-Driven Fraud Is on the Rise. Here’s How to Combat It.

AI is being used to create fake identities, send convincing phishing emails and even clone voices to steal user data and money. Fighting it starts with awareness.  

Image: Shutterstock / Built In
Mustafa Suleyman Mustafa Suleyman
Updated on September 07, 2023

Can We Control Technology?

Understanding technology means understanding the unintended consequences of technological breakthroughs.

Image: Shutterstock / Built In
Reed McGinley-Stempel Reed McGinley-Stempel
Updated on September 05, 2023

AI Just Might Kill Your Company

But it doesn’t have to be today, next week or even next year. Think about your strategy and avoid knee-jerk reactions.

Image: Shutterstock / Built In
Gordon Gottsegen Gordon Gottsegen
Updated on August 07, 2023

Machine Learning in Cybersecurity: How It Works and Companies to Know

Machine learning in cybersecurity is evolving to address new cyber threats, and these companies are leading the way with ML-based cybersecurity solutions.

Image: Shutterstock
Jeremy Bradley Jeremy Bradley
Updated on June 28, 2023

An Introduction to Homomorphic Encryption for Business Leaders

Homomorphic encryption allows companies to analyze sensitive data in an encrypted format to reduce potential security breaches. Here’s what to know.

Image: Shutterstock / Built In
Ken Cox Ken Cox
Updated on June 28, 2023

Why We Can’t Ignore the Dark Side of AI

As AI continues to evolve, it introduces greater security and data risks. Here’s what we need to do about it.  

Image: Shutterstock / Built In
Tammy Xu Tammy Xu
Updated on April 27, 2023

What Is Fuzz Testing? How Does It Work?

Fuzz testing can catch application errors that other testing tools miss. Here’s how it works and the types to know.

Image: Shutterstock
Katlyn Gallo Katlyn Gallo
Updated on April 04, 2023

What Is LDAP (Lightweight Directory Access Protocol)?

Why do we use LDAP and how does it work? Our expert explains the ins and outs of the Lightweight Directory Access Protocol.

Image: Shutterstock / Built In
Estefanía García Gallardo Estefanía García Gallardo
Updated on March 28, 2023

What Is File Transfer Protocol (FTP)?

File transfer protocol has been around for many years and is largely used to share files over the internet. Here’s how it works and why we still use it.

Image: Shutterstock / Built In