Cybersecurity Articles

Sorted By: Most Recent
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

How to Build an Effective Cybersecurity Program for Your Business

Because of the increasing number of threats, every business needs a comprehensive cybersecurity program. Here are the most important components you need to include.

Stephen Gossett Stephen Gossett
Updated on April 15, 2024

4 Types of Insider Threats — and How to Minimize Them

Think gamified training, password managers and anomaly detection.

Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

SAST vs. DAST: What’s the Difference?

SAST and DAST are two methods for testing the security of a web application. Here are the key differences between them.,

Image: Shutterstock / Built In
Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on April 15, 2024

12 Penetration Testing Certification Options to Know

These cybersecurity credentials prove you're a hacker with a heart of gold.

Image: shutterstock
Brand Studio Logo
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

What Is SSO?

SSO (single sign-on) is a method of authentication that uses one set of credentials to authenticate to one or more applications.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 15, 2024

What Is Cybersecurity Incident Response and Handling?

Incident response refers to the overall cybersecurity process for responding to cyberattacks and data breaches, including all techniques attempted to contain the threat, reduce damage and mitigate consequences.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 15, 2024

What Is a DDoS Attack?

In a DDoS attack, multiple computers are used to target a resource. The desired outcome is to crash the target server, rendering it unable to process requests. 

Image: Shutterstock / Built In
Stephen Gossett Stephen Gossett
Updated on April 12, 2024

What Every Developer Should Know About Threat Modeling

You might be doing it already without even realizing it.

Tammy Xu Tammy Xu
Updated on April 10, 2024

What Do Security Incident Response Team (SIRT) Engineers Do?

SIRT engineering is a high-pressure job, but for the right person, it can be really rewarding.