Security Articles

Sorted By: Most Recent
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is SQL Injection?

SQL injection is a type of cyberattack that lets a criminal execute their own SQL queries on a database. Here are some examples.

Image: Shutterstock / Built In
Josh Tolley Josh Tolley
Updated on May 01, 2024

What Really Is a Good Return on Investment?

Our expert breaks down the four types of saving most people fall into, and how you can probably be doing it better.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In
K. Scott Griffith K. Scott Griffith
Updated on April 22, 2024

Get Your Flu Shot. Seriously.

This cold and flu season, our expert looks at how vaccines are made and a future with fewer flu and cold cases.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

What Is Cyber Insurance? Why Do Tech Companies Need It?

Cyber insurance can cover financial losses when a company experiences a security breach.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Misha Seltzer Misha Seltzer
Updated on April 20, 2024

Security or Productivity? For Businesses Using SaaS Platforms, It’s a Balancing Act.

CISOs, you’ve got a big job on your hands. Read on to learn about the threat and how to mitigate it.

Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Joshua Burnham Joshua Burnham
Updated on April 20, 2024

How the Cybersecurity Industry Is Evolving

In honor of cybersecurity awareness month, here are some new industry trends to keep an eye on.

Image: Shutterstock / Built In