Cybersecurity Articles

Sorted By: Most Recent
Katlyn Gallo Katlyn Gallo
Updated on June 17, 2025

What Is PHI (Protected Health Information)?

PHI (protected health information) is data collected about patients. Here’s what counts as PHI and why it’s important to protect.

Image: Shutterstock / Built In
Isaac Evans Isaac Evans
Updated on June 16, 2025

Why Developer-First Security Is About Guardrails, Not Gates

Despite the promises of the “shift left,” how security is implemented is far more important than when. Our expert lays our a vision for a developer-first security posture based on guardrails, not gates..

Image: Shutterstock / Built In
Kumar Goswami Kumar Goswami
Updated on June 13, 2025

You’re Probably Ignoring a Vulnerability That Could Cost You Millions in Ransomware Attacks

Companies often forget to protect unstructured file data, which makes it an ideal attack surface. Our expert tells you how to stay safe.

Image: Shutterstock / Built In
Éireann Leverett Éireann Leverett
Updated on June 05, 2025

How Cybersecurity Teams Can Stay Ahead in 2025 and Beyond

Chat logs from cyber threat group Black Basta reveal that a company’s greatest vulnerability is its overlooked infrastructure. Here’s what that means for cybersecurity defense.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on June 04, 2025

34 Top Cloud Security Companies to Know

Cybersecurity for the cloud is important for your business. Here are companies that specialize in it.

Image: Shutterstock
Mitchell Telatnik Mitchell Telatnik
Updated on June 02, 2025

Passwordless Authentication: Why to Ditch Your Passwords

To avoid account compromises, security professionals recommend using passwordless authentication. Here’s why.

Image: Shutterstock / Built In
Mike Thomas Mike Thomas
Updated on May 30, 2025

50 Top Cybersecurity Companies to Know

These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.

Image: Shutterstock
Matias Madou Matias Madou
Updated on May 27, 2025

How to Tame ‘Unleashed’ AI-Assisted Software Development

The rise of AI coding assistants in software development has introduced new vulnerabilities. Our expert offers advice for stemming the tide.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on May 27, 2025

Best Practices for Secure Kotlin App Development

As Kotlin is quickly becoming a popular and highly paid language, our expert shares some tips for building secure products with it.

Image: Shutterstock / Built In
Abhinav Singh Abhinav Singh
Updated on May 22, 2025

What Is a Rate Limiter?

A rate limiter is a defensive mechanism used in a distributed system to prevent the frequency of an operation from exceeding a defined limit and causing server errors. Here’s what you need to know.

Image: Shutterstock / Built In