Cybersecurity Articles

Sorted By: Most Recent
Roman Davydov Roman Davydov
Updated on May 27, 2025

Best Practices for Secure Kotlin App Development

As Kotlin is quickly becoming a popular and highly paid language, our expert shares some tips for building secure products with it.

Image: Shutterstock / Built In
Abhinav Singh Abhinav Singh
Updated on May 22, 2025

What Is a Rate Limiter?

A rate limiter is a defensive mechanism used in a distributed system to prevent the frequency of an operation from exceeding a defined limit and causing server errors. Here’s what you need to know.

Image: Shutterstock / Built In
Parag Radke Parag Radke
Updated on May 22, 2025

Mutual TLS: A Tutorial

Mutual transport layer security (mTLS) is a security method that verifies both parties’ identities in a data transaction by confirming whether each has the correct private key. Here’s how it works, its applications, pros, cons and how to set it up.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on May 22, 2025

What Is Data Integrity?

Data integrity means data is collected in a compliant manner, accurate, complete and consistent throughout its lifecycle. Here’s why it’s important and the main types of data integrity to know.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on May 22, 2025

What Is a Firewall?

A firewall is a security device that monitors and regulates incoming and outgoing network traffic based on a set of rules. Here’s how firewalls work, their advantages, main types and common applications.

Image: Shutterstock / Built In
Giorgos Myrianthous Giorgos Myrianthous
Updated on May 20, 2025

What Is Prompt Injection?

Prompt injection is a cyberattack that takes advantage of the greatest strength of an LLM: Its ability to understand natural language. Our expert details how it works and how to guard against it.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on May 09, 2025

11 Automotive Cybersecurity Examples to Know

The new wave of autotech is only as good as the cybersecurity tools protecting it. These 10 companies are improving future transportation.

Image: Shutterstock
Apu Pavithran Apu Pavithran
Updated on May 05, 2025

What Is Screen Hacking?

Our expert explains the newest cybersecurity threat and how to keep your devices safe.

Image: Shutterstock / Built In
Vinay Goel Vinay Goel
Updated on April 30, 2025

How to Use Generative AI Without Losing Your Job

Don’t get fired for using ChatGPT or other AI tools. Here's what how to use generative AI safely and avoid career ending security mistakes.

Image: Shutterstock / Built In
Toni de la Fuente Toni de la Fuente
Updated on April 17, 2025

Why Open Source Is the Future of Cloud Protection

Open-source cloud security tools offer increased transparency, flexibility and control. Here’s why it might signal the end of black-box security solutions.

Image: Shutterstock / Built In