Cybersecurity Articles

Sorted By: Most Recent
Éireann Leverett Éireann Leverett
Updated on June 05, 2025

How Cybersecurity Teams Can Stay Ahead in 2025 and Beyond

Chat logs from cyber threat group Black Basta reveal that a company’s greatest vulnerability is its overlooked infrastructure. Here’s what that means for cybersecurity defense.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on June 02, 2025

Passwordless Authentication: Why to Ditch Your Passwords

To avoid account compromises, security professionals recommend using passwordless authentication. Here’s why.

Image: Shutterstock / Built In
Matias Madou Matias Madou
Updated on May 27, 2025

How to Tame ‘Unleashed’ AI-Assisted Software Development

The rise of AI coding assistants in software development has introduced new vulnerabilities. Our expert offers advice for stemming the tide.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on May 27, 2025

Best Practices for Secure Kotlin App Development

As Kotlin is quickly becoming a popular and highly paid language, our expert shares some tips for building secure products with it.

Image: Shutterstock / Built In
Abhinav Singh Abhinav Singh
Updated on May 22, 2025

What Is a Rate Limiter?

A rate limiter is a defensive mechanism used in a distributed system to prevent the frequency of an operation from exceeding a defined limit and causing server errors. Here’s what you need to know.

Image: Shutterstock / Built In
Parag Radke Parag Radke
Updated on May 22, 2025

Mutual TLS: A Tutorial

Mutual transport layer security (mTLS) is a security method that verifies both parties’ identities in a data transaction by confirming whether each has the correct private key. Here’s how it works, its applications, pros, cons and how to set it up.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on May 22, 2025

What Is Data Integrity?

Data integrity means data is collected in a compliant manner, accurate, complete and consistent throughout its lifecycle. Here’s why it’s important and the main types of data integrity to know.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on May 22, 2025

What Is a Firewall?

A firewall is a security device that monitors and regulates incoming and outgoing network traffic based on a set of rules. Here’s how firewalls work, their advantages, main types and common applications.

Image: Shutterstock / Built In
Giorgos Myrianthous Giorgos Myrianthous
Updated on May 20, 2025

What Is Prompt Injection?

Prompt injection is a cyberattack that takes advantage of the greatest strength of an LLM: Its ability to understand natural language. Our expert details how it works and how to guard against it.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on May 09, 2025

11 Automotive Cybersecurity Examples to Know

The new wave of autotech is only as good as the cybersecurity tools protecting it. These 10 companies are improving future transportation.

Image: Shutterstock