Cybersecurity Articles

Sorted By: Most Recent
Margo Steines Margo Steines
Updated on October 17, 2024

30 Companies Hiring Cybersecurity Professionals

These cybersecurity jobs cover industries like insurance, automotive manufacturing and financial services.

Photo: Shutterstock
Metin Kortak Metin Kortak
Updated on October 17, 2024

How to Fix SSH ‘Connection Refused’ Error

An SSH ‘Connection Refused’ error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s how to fix it.

STOCK HOLD
Peter Grant Peter Grant
Updated on October 10, 2024

What Are Alphanumeric Characters?

Alphanumeric characters are the alphabetical letters and numerical numbers used in a given language.

Image: Shutterstock / Built In
Sascha Giese Sascha Giese
Updated on October 09, 2024

How to Exorcise the Modern Horrors of IT

Your average IT team faces as many shadowy monsters as a camper in a horror movie. Our expert gives you some tools to battle back against them.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on October 09, 2024

30 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock
Alyssa Schroer Alyssa Schroer
Updated on October 08, 2024

AI Cybersecurity: 18 Companies to Know

These AI cybersecurity solutions save time and money by providing IT and security teams with tools to protect data and networks against cyber attacks.

Image: Shutterstock
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In
Mike Thomas Mike Thomas
Updated on October 02, 2024

46 Top Cybersecurity Companies to Know

These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.

Image: Shutterstock
Nazy Fouladirad Nazy Fouladirad
Updated on October 01, 2024

So, You’ve Been Hacked. Now What?

Cyber attacks can happen to any company. Here’s what to do after a breach and how to protect your business against another one.

Image: Shutterstock / Built In
Ian Paterson Ian Paterson
Updated on October 01, 2024

Here’s How Behavioral Biometrics Can Boost Security

Behavioral biometrics use employees’ unique behaviors to reduce cyberthreats.

Image: Shutterstock / Built In