Cybersecurity + IT Articles

Sorted By: Most Recent
Robert Chamberlin Robert Chamberlin
Updated on July 25, 2025

Why Physical Security Gaps Are a Threat to AI

AI innovation depends on physical infrastructure, yet physical security is often an afterthought. Here’s why that’s a problem.

Image: Shutterstock / Built In
Anupam Upadhyaya Anupam Upadhyaya
Updated on July 24, 2025

Why Modern Data Security Challenges Require a Holistic Approach

Existing efforts to stymie the top data risks of today often fail. Our expert explains why a holistic, multilayered approach is required to fix modern data security.

Image: Shutterstock / Built In
Mike Mitchell Mike Mitchell
Updated on July 22, 2025

4 Essential Skills for Cyber Threat-Hunting Teams

The rise of stealthy cybersecurity threats demands a new set of skills. So, what should CISOs look for when hiring?

Image: Shutterstock / Built In
Thomas Graham Thomas Graham
Updated on July 21, 2025

Hidden Costs in CMMC Cloud Compliance Could Jeopardize Certification

CMMC compliance is now critical for defense contractors but hidden costs abound. Our expert offers some advice.

Image: Shutterstock / Built In
Alex Ferrer Alex Ferrer
Updated on July 17, 2025

How Blockchain Is Used to Trace Stolen Crypto Assets

Blockchain forensics is the process of using blockchain tools to track down stolen crypto funds across chains and wallets. Here’s how it works.

Image: Shutterstock / Built In
Toni de la Fuente Toni de la Fuente
Updated on June 25, 2025

The Hidden Cost of Cloud Complexity and the Open Path Forward

Multi-cloud solutions can add unnecessary complexity that can increase security challenges. Here’s how open cloud security can help shore up those risks.

Image: Shutterstock / Built In
Isaac Evans Isaac Evans
Updated on June 16, 2025

Why Developer-First Security Is About Guardrails, Not Gates

Despite the promises of the “shift left,” how security is implemented is far more important than when. Our expert lays our a vision for a developer-first security posture based on guardrails, not gates..

Image: Shutterstock / Built In
Kumar Goswami Kumar Goswami
Updated on June 13, 2025

You’re Probably Ignoring a Vulnerability That Could Cost You Millions in Ransomware Attacks

Companies often forget to protect unstructured file data, which makes it an ideal attack surface. Our expert tells you how to stay safe.

Image: Shutterstock / Built In
Éireann Leverett Éireann Leverett
Updated on June 05, 2025

How Cybersecurity Teams Can Stay Ahead in 2025 and Beyond

Chat logs from cyber threat group Black Basta reveal that a company’s greatest vulnerability is its overlooked infrastructure. Here’s what that means for cybersecurity defense.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on May 27, 2025

Best Practices for Secure Kotlin App Development

As Kotlin is quickly becoming a popular and highly paid language, our expert shares some tips for building secure products with it.

Image: Shutterstock / Built In