Cybersecurity Articles

Sorted By: Most Recent
Patrick Scully Patrick Scully
Updated on August 18, 2025

What Is the Current Status of Quantum Technology?

Though scalable quantum computers remain in the future, some of the threats they’ll bring are here today. Here’s how to stay safe.

Image: Shutterstock / Built In
Mike Hyzy Mike Hyzy
Updated on August 12, 2025

What Is Threatcasting?

Threatcasting is a strategic method for anticipating and mitigating risks a decade in advance. Our expert offers an introduction.

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on August 11, 2025

17 Private Search Engines to Know

As data tracking ramps up, these privacy-first search engines offer a rare pause from constant digital surveillance.

Image: Shutterstock
Alex Vakulov Alex Vakulov
Updated on August 07, 2025

Security Fundamentals for WordPress Sites

WordPress sites have some intrinsic vulnerabilities that make them tempting targets for attackers. Our expert offers tips on staying safe.

Image: Shutterstock / Built In
Alex Williams Alex Williams
Updated on August 01, 2025

What Is a Data Governance Framework?

A data governance framework is a series of regulations and role assignments that assure cooperation in a company’s data management.

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on July 30, 2025

What Is Biometrics?

Biometrics authenticates identity by logging the way someone looks or how they behave.

Image: Shutterstock
Russ Munisteri Russ Munisteri
Updated on July 30, 2025

Laid Off From IT? How to Transfer to a Cybersecurity Role.

Cybersecurity careers are often a perfect fit for IT professionals thanks to its mix of growth opportunities and similar skill sets. Here’s how to make the leap.   

Image: Shutterstock / Built In
David Montoya David Montoya
Updated on July 29, 2025

The Uptime Cybersecurity Gap: Why Companies Must Close It Before It’s Too Late

Legacy systems and outdated infrastructure pose significant security risks for companies reliant on uptime operations. Here’s how they can close the uptime security gap. 

Image: Shutterstock / Built In
Robert Chamberlin Robert Chamberlin
Updated on July 25, 2025

Why Physical Security Gaps Are a Threat to AI

AI innovation depends on physical infrastructure, yet physical security is often an afterthought. Here’s why that’s a problem.

Image: Shutterstock / Built In
Anupam Upadhyaya Anupam Upadhyaya
Updated on July 24, 2025

Why Modern Data Security Challenges Require a Holistic Approach

Existing efforts to stymie the top data risks of today often fail. Our expert explains why a holistic, multilayered approach is required to fix modern data security.

Image: Shutterstock / Built In