Cybersecurity Articles

Sorted By: Most Recent
Erin Hamm Erin Hamm
Updated on March 17, 2025

The Crawl-Walk-Run Approach to Generative AI Security

Rushing to adopt the latest generative AI security tools can create larger problems in the future. Here’s why a slower, simpler approach is better. 

Image: Shutterstock / Built In
Margo Steines Margo Steines
Updated on March 11, 2025

41 Companies Hiring Cybersecurity Professionals

These cybersecurity jobs cover industries like insurance, automotive manufacturing and financial services.

Photo: Shutterstock
Alyssa Schroer Alyssa Schroer
Updated on March 11, 2025

AI Cybersecurity: 19 Companies to Know

These AI cybersecurity solutions save time and money by providing IT and security teams with tools to protect data and networks against cyber attacks.

Image: Shutterstock
Chintan Parikh Chintan Parikh
Updated on March 10, 2025

Understanding the Hidden Risks of AI Agent Adoption

AI agents promise to automate tasks and enhance efficiency, however they can also present unique security vulnerabilities. Here’s what to know.

Image: Shutterstock / Built In
Sebastian Straub Sebastian Straub
Updated on March 05, 2025

5 Ways Ransomware Will Change in 2025

Cybercriminals are finding it easier than ever before to get in the ransomware game. Our expert explains what that means and how to stay safe.

Image: Shutterstock / Built In
Peleg Porat Peleg Porat
Updated on March 03, 2025

5 Tasks Developers Shouldn’t Do With AI Coding Assistants

AI-powered coding assistants can help improve developer efficiency, but they are limited when it comes to debugging, predicting real-world performance impacts and more. Here’s why.

Image: Shutterstock / Built In
Rob Lowe Rob Lowe
Updated on March 03, 2025

How to Adopt AI Solutions While Safeguarding Data Privacy

To unlock the full benefits of artificial intelligence, companies and users need to understand how to protect the data that drives the systems.

Image: Shutterstock / Built In
Margo Steines Margo Steines
Updated on February 26, 2025

6 Top Facial Recognition Companies

These facial recognition companies develop technology with a wide range of uses for both businesses and consumers.

Photo: Shutterstock
Thulasi Rangan Jayakumar Thulasi Rangan Jayakumar
Updated on February 19, 2025

What Is Anomaly Detection?

Anomaly detection involves finding deviations from expected patterns in order to proactively safeguard systems. Our expert explains how it works.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on February 18, 2025

Log4j Vulnerability Explained: What It Is and How to Fix It

The Log4j vulnerability is a software vulnerability in Log4j — an open-source library commonly used in Java-based systems and applications. Here’s how the vulnerability works, the response to and impact of the vulnerability and tips to mitigate it.

Image: Shutterstock / Built In