Cybersecurity Articles

Sorted By: Most Recent
Nicky Watson Nicky Watson
Updated on March 25, 2025

How DOGE Puts Personal Data Privacy at Risk

The Department of Government Efficiency’s (DOGE) access to troves of personal data carries significant data privacy risks and could have far-reaching consequences. Learn more. 

Image: Shutterstock / Built In
Judith Etugbo Judith Etugbo
Updated on March 25, 2025

Why Zero-Knowledge Proofs Are the Future of Blockchain Security

A zero-knowledge proof is a cryptographic method that allows one party to provide provable information to the other party without revealing that information. Here’s how it works. 

Image: Shutterstock / Built In
Hal Koss Hal Koss
Updated on March 25, 2025

It’s Time to Adjust Your IT Strategy to Support a Remote Workforce

Start by optimizing tech stacks for new, asynchronous workflows.

It’s Time to Adjust Your IT Strategy to Support a Remote Workforce
Tammy Xu Tammy Xu
Updated on March 20, 2025

How to Stop a DDoS Attack: A Guide

Take these steps to stop a DDoS attack from hurting your company.

How to Stop a DDoS Attack: A Guide
Tatum Hunter Tatum Hunter
Updated on March 20, 2025

Deepfake Phishing: Is That Actually Your Boss Calling?

Deepfake technology is outpacing our ability to spot it. That could be bad news for cybersecurity.

Deepfake Phishing: Is That Actually Your Boss Calling?
Fotios Chantzis Ioannis Stais Fotios Chantzis Ioannis Stais
Updated on March 20, 2025

Why Is IoT Security Important?

An excerpt from the forthcoming book Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things.

Why Is IoT Security Important?
Neil Daswani and Moudy Elbayadi Neil Daswani and Moudy Elbayadi
Updated on March 20, 2025

3 Pragmatic Root Causes of Data Breaches

At the highest level, cybersecurity breaches are the result of one of three problems: lack or prioritization, lack of investment or poor execution of security procedures.

3 Pragmatic Root Causes of Data Breaches
Charli Renken Charli Renken
Updated on March 20, 2025

Google Acquires Mandiant for $5.4B to Strengthen Cybersecurity Operations

The Reston company will join Google Cloud while maintaining its own branding.

Mandiant logo
Erin Hamm Erin Hamm
Updated on March 17, 2025

The Crawl-Walk-Run Approach to Generative AI Security

Rushing to adopt the latest generative AI security tools can create larger problems in the future. Here’s why a slower, simpler approach is better. 

Image: Shutterstock / Built In
Margo Steines Margo Steines
Updated on March 11, 2025

41 Companies Hiring Cybersecurity Professionals

These cybersecurity jobs cover industries like insurance, automotive manufacturing and financial services.

Photo: Shutterstock