Cybersecurity Articles

Sorted By: Most Recent
JP Perez-Etchegoyen JP Perez-Etchegoyen
Updated on August 22, 2025

The CISO’s AI Cybersecurity Survival Guide

AI is scrambling the cybersecurity ecosystem. Our expert offers 10 tips for CISOs to stay ahead of the threats.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on August 21, 2025

19 Top Cybersecurity Training Programs and Online Courses to Know

These courses cover everything from malware analysis to cloud security.

Image: Shutterstock
Brand Studio Logo
Anthony Corbo Anthony Corbo
Updated on August 21, 2025

What Is Ethical Hacking?

Ethical hacking is an offensive-focused security investigation used to identify and identify and safely test cybersecurity vulnerabilities within an IT environment.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on August 21, 2025

35 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock
Ken Jon Miyachi Ken Jon Miyachi
Updated on August 21, 2025

How the Senate’s AI Regulation Reversal Opens Door to State-Driven Deepfake Laws

With the ban on state-level AI regulation rescinded, companies may face a patchwork of state-level regulation. Here’s what we can expect.

Image: Shutterstock / Built In
Alexandria Jacobson Alexandria Jacobson
Updated on August 20, 2025

8 Ways to Avoid 7 NFT Scams

Keep your NFTs and crypto safe with these tips.

Image: Shutterstock
Stephen Gossett Stephen Gossett
Updated on August 20, 2025

These 11 Startups Are Working on Data Privacy in Machine Learning

Techniques like federated learning and differential privacy are maturing — and attracting significant VC investment.

Anthony Corbo Anthony Corbo
Updated on August 19, 2025

What Is IT Security?

IT security is a series of security concepts, tools and practices that are utilized to mitigate threats and safeguard data in the face of an attack.

Image: Shutterstock / Built In
Andy Maus Andy Maus
Updated on August 18, 2025

Lessons From a Major Cyber Attack on a City Government

The recent ransomware attack on St. Paul, Minnesota underscores a larger pattern of cyber attacks affecting municipalities across the U.S. Here’s what can be done about it. 

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on August 18, 2025

What Is Identity Management?

Identity management is the process of creating, verifying and maintaining digital identities to ensure that only authorized users can access an organization’s systems and data.

Image: Shutterstock / Built In