Cybersecurity Articles

Sorted By: Most Recent
Andy Maus Andy Maus
Updated on August 18, 2025

Lessons From a Major Cyber Attack on a City Government

The recent ransomware attack on St. Paul, Minnesota underscores a larger pattern of cyber attacks affecting municipalities across the U.S. Here’s what can be done about it. 

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on August 18, 2025

What Is Identity Management?

Identity management is the process of creating, verifying and maintaining digital identities to ensure that only authorized users can access an organization’s systems and data.

Image: Shutterstock / Built In
Patrick Scully Patrick Scully
Updated on August 18, 2025

What Is the Current Status of Quantum Technology?

Though scalable quantum computers remain in the future, some of the threats they’ll bring are here today. Here’s how to stay safe.

Image: Shutterstock / Built In
Mike Hyzy Mike Hyzy
Updated on August 12, 2025

What Is Threatcasting?

Threatcasting is a strategic method for anticipating and mitigating risks a decade in advance. Our expert offers an introduction.

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on August 11, 2025

17 Private Search Engines to Know

As data tracking ramps up, these privacy-first search engines offer a rare pause from constant digital surveillance.

Image: Shutterstock
Alyssa Schroer Alyssa Schroer
Updated on August 07, 2025

AI Cybersecurity: 24 Companies to Know

These AI cybersecurity solutions save time and money by providing IT and security teams with tools to protect data and networks against cyber attacks.

Image: Shutterstock
Alex Vakulov Alex Vakulov
Updated on August 07, 2025

Security Fundamentals for WordPress Sites

WordPress sites have some intrinsic vulnerabilities that make them tempting targets for attackers. Our expert offers tips on staying safe.

Image: Shutterstock / Built In
Alex Williams Alex Williams
Updated on August 01, 2025

What Is a Data Governance Framework?

A data governance framework is a series of regulations and role assignments that assure cooperation in a company’s data management.

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on July 30, 2025

What Is Biometrics?

Biometrics authenticates identity by logging the way someone looks or how they behave.

Image: Shutterstock
Russ Munisteri Russ Munisteri
Updated on July 30, 2025

Laid Off From IT? How to Transfer to a Cybersecurity Role.

Cybersecurity careers are often a perfect fit for IT professionals thanks to its mix of growth opportunities and similar skill sets. Here’s how to make the leap.   

Image: Shutterstock / Built In