Cybersecurity Articles

Sorted By: Most Recent
Parag Radke Parag Radke
Updated on April 10, 2025

Mutual TLS: A Tutorial

Mutual transport layer security (mTLS) is a security method that verifies both parties’ identities in a data transaction by confirming whether each has the correct private key. Here’s how it works, its applications, pros, cons and how to set it up.

Image: Shutterstock / Built In
Tammy Xu Tammy Xu
Updated on April 10, 2025

13 Best Practices for Improving Web Application Security

Here’s what you need to know to get started.

13 Best Practices for Improving Web Application Security
Tammy Xu Tammy Xu
Updated on April 08, 2025

U.S. Manufacturing Jobs Aren’t Gone — They’re Evolving

Some estimates say 2.4 million U.S. manufacturing jobs will go unfilled by 2028, due to lacking technical expertise.

U.S. Manufacturing Jobs Aren’t Gone — They’re Evolving
Andreas Rekdal Andreas Rekdal
Updated on April 08, 2025

New plug-and-play privacy device lets you opt out of giving away all your data

Winston Privacy, a cybersecurity startup based out of Chicago’s mHUB innovation center, has built a plug-and-play device that lets everyday internet users opt out of being tracked online.

Mitchell Telatnik Mitchell Telatnik
Updated on April 04, 2025

What Is a Firewall?

A firewall is a security device that monitors and regulates incoming and outgoing network traffic based on a set of rules. Here’s how firewalls work, their advantages, main types and common applications.

Image: Shutterstock / Built In
Mike Cobb Mike Cobb
Updated on April 01, 2025

What Happens to Your Data When Companies Go Bankrupt?

23andMe’s bankruptcy filing has underscored a chilling reality for consumers: your personal data can be sold off as an asset when companies collapse, even after you delete it. Here’s what to know.

Image: Shutterstock / Built In
Taylor Rose Taylor Rose
Updated on April 01, 2025

How FirstBank Uses AI to Fortify Its Cybersecurity Defense

An inside look at how FirstBank’s tech and security teams use AI to identify anomalies and anomalous behaviors, and improve incident response time.

How FirstBank Uses AI to Fortify Its Cybersecurity Defense
Brand Studio Logo
Stephen Ostrowski Stephen Ostrowski
Updated on March 27, 2025

Why Tech, Teamwork and Transparency Is Elemental to These Product Management Professionals

At this security company, “anybody can have a good idea.” How SailPoint employees seek to equip users with impactful product.

Illustration of people working together to put lightbulb puzzle pieces together
Metin Kortak Metin Kortak
Updated on March 26, 2025

How to Fix the SSH “Connection Refused” Error (With 5 Troubleshooting Methods)

An SSH “Connection Refused” error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s what can cause this error, troubleshooting tips, security best practices and more on how SSH works.

Image: Shutterstock / Built In