Cybersecurity Articles

Sorted By: Most Recent
Robert Chamberlin Robert Chamberlin
Updated on July 25, 2025

Why Physical Security Gaps Are a Threat to AI

AI innovation depends on physical infrastructure, yet physical security is often an afterthought. Here’s why that’s a problem.

Image: Shutterstock / Built In
Anupam Upadhyaya Anupam Upadhyaya
Updated on July 24, 2025

Why Modern Data Security Challenges Require a Holistic Approach

Existing efforts to stymie the top data risks of today often fail. Our expert explains why a holistic, multilayered approach is required to fix modern data security.

Image: Shutterstock / Built In
Stephen Gossett Stephen Gossett
Updated on July 23, 2025

What Is Differential Privacy? Can ‘Noisy’ Data Help Add Anonymity to Public Data Sets?

The census and COVID exposure trackers rely on deliberately noisy data as a privacy measure. Here’s how it works.

Peter Grant Peter Grant
Updated on July 22, 2025

What Are Alphanumeric Characters?

Alphanumeric characters refer to the combination of Latin alphabet letters (A to Z — uppercase and lowercase) and Arabic numerals (0 to 9). This set is commonly used in English and other languages based on the Latin script, especially in computing.

Image: Shutterstock / Built In
Mike Mitchell Mike Mitchell
Updated on July 22, 2025

4 Essential Skills for Cyber Threat-Hunting Teams

The rise of stealthy cybersecurity threats demands a new set of skills. So, what should CISOs look for when hiring?

Image: Shutterstock / Built In
Thomas Graham Thomas Graham
Updated on July 21, 2025

Hidden Costs in CMMC Cloud Compliance Could Jeopardize Certification

CMMC compliance is now critical for defense contractors but hidden costs abound. Our expert offers some advice.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on July 18, 2025

What Is Cybersecurity Incident Response?

Incident response is the cybersecurity process for detecting, containing and recovering from cyberattacks and data breaches.

Image: Shutterstock / Built In
Alex Ferrer Alex Ferrer
Updated on July 17, 2025

How Blockchain Is Used to Trace Stolen Crypto Assets

Blockchain forensics is the process of using blockchain tools to track down stolen crypto funds across chains and wallets. Here’s how it works.

Image: Shutterstock / Built In
Alex Ferrer Alex Ferrer
Updated on July 17, 2025

6 Crypto Fraud Trends to Know and How to Spot Them

Crypto fraud has transformed from a fringe threat to a mainstream crisis. Here’s what to look out for and how to prevent it. 

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on July 14, 2025

What Are Cybersecurity Frameworks?

Cybersecurity frameworks are utilized to add structure and methodology to the protection of digital assets.

Image: Shutterstock / Built In