Expert Contributors Articles

Sorted By: Most Recent
Allan Wintersieck Allan Wintersieck
Updated on August 26, 2025

Do You Need to Rely on Agile Methodology?

Sure, the process offers benefits for many digital products. But sometimes agile is not the best solution for your needs.

Andrew Scivally Andrew Scivally
Updated on August 26, 2025

Stop Growing Someone Else’s Pipeline

If you offer both products and services, aligning your sales strategy can be tough. But the key is to focus on growing your own technology ecosystem.

Image: Shutterstock / Built In
Eugenia Mykuliak Eugenia Mykuliak
Updated on August 26, 2025

What Fintech Startups Get Wrong About Compliance and How to Fix It

Compliance is often treated as a last-minute add-on to fintech products. Here’s why that’s a problem both for scalability and the company finances.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on August 25, 2025

What Is Spear Phishing?

Spear phishing is a type of phishing attack where cybercriminals impersonate trusted sources to deceive individuals into revealing sensitive data or downloading malware.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on August 25, 2025

What Is SQL Injection?

SQL injection is a code injection cyber attack that allows an attacker to manipulate a database by inserting malicious SQL statements into an application’s input fields.

Image: Shutterstock / Built In
Anmolika Singh Anmolika Singh
Updated on August 25, 2025

What Is Data Lineage?

Data lineage tracks how data moves and transforms across systems. Learn how it supports governance, observability and regulatory compliance.

Image: Shutterstock / Built In
Alex Williams Alex Williams
Updated on August 25, 2025

What Is Symfony?

Symfony is an open-source PHP framework that helps build scalable, flexible web applications using reusable bundles and modular components.

Image: Shutterstock / Built In
Artturi Jalli Artturi Jalli
Updated on August 25, 2025

What Is Source Code?

Source code is the written instructions that guide a computer program’s execution. It is written in a human-readable programming language, which is then compiled or interpreted to make it executable by a computer.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on August 25, 2025

What Is a DDoS Attack?

A distributed denial-of-service (DDoS) attack is a cyber attack that uses multiple compromised devices to overwhelm a system with traffic, disrupting access to its services.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on August 25, 2025

What Is Smishing?

Smishing (or SMS phishing) is a form of phishing where attackers use text messages to deceive individuals into sharing sensitive information, sending money or downloading malicious software.

Image: Shutterstock / Built In