Cybersecurity Articles

Sorted By: Most Recent
Sam Daley Sam Daley
Updated on May 09, 2025

11 Automotive Cybersecurity Examples to Know

The new wave of autotech is only as good as the cybersecurity tools protecting it. These 10 companies are improving future transportation.

Image: Shutterstock
Apu Pavithran Apu Pavithran
Updated on May 05, 2025

What Is Screen Hacking?

Our expert explains the newest cybersecurity threat and how to keep your devices safe.

Image: Shutterstock / Built In
Vinay Goel Vinay Goel
Updated on April 30, 2025

How to Use Generative AI Without Losing Your Job

Don’t get fired for using ChatGPT or other AI tools. Here's what how to use generative AI safely and avoid career ending security mistakes.

Image: Shutterstock / Built In
Mike Thomas Mike Thomas
Updated on April 28, 2025

48 Top Cybersecurity Companies to Know

These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.

Image: Shutterstock
Margo Steines Margo Steines
Updated on April 24, 2025

42 Companies Hiring Cybersecurity Professionals

These cybersecurity jobs cover industries like insurance, automotive manufacturing and financial services.

Photo: Shutterstock
Toni de la Fuente Toni de la Fuente
Updated on April 17, 2025

Why Open Source Is the Future of Cloud Protection

Open-source cloud security tools offer increased transparency, flexibility and control. Here’s why it might signal the end of black-box security solutions.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 17, 2025

What Is Data Integrity?

Data integrity means data is collected in a compliant manner, accurate, complete and consistent throughout its lifecycle. Here’s why it’s important and the main types of data integrity to know.

Image: Shutterstock / Built In
Parag Radke Parag Radke
Updated on April 10, 2025

Mutual TLS: A Tutorial

Mutual transport layer security (mTLS) is a security method that verifies both parties’ identities in a data transaction by confirming whether each has the correct private key. Here’s how it works, its applications, pros, cons and how to set it up.

Image: Shutterstock / Built In
Tammy Xu Tammy Xu
Updated on April 10, 2025

13 Best Practices for Improving Web Application Security

Here’s what you need to know to get started.

13 Best Practices for Improving Web Application Security
Tammy Xu Tammy Xu
Updated on April 08, 2025

U.S. Manufacturing Jobs Aren’t Gone — They’re Evolving

Some estimates say 2.4 million U.S. manufacturing jobs will go unfilled by 2028, due to lacking technical expertise.

U.S. Manufacturing Jobs Aren’t Gone — They’re Evolving