Cybersecurity Articles

Sorted By: Most Recent
Nenad Zaric Nenad Zaric
Updated on July 10, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Gordon Gottsegen Gordon Gottsegen
Updated on July 09, 2024

19 Publicly Traded Cybersecurity Companies to Follow

In our digitally hyperconnected world, cybersecurity companies are more in demand than ever. We’ve rounded up 18 publicly traded ones.

Image: Shutterstock
Metin Kortak Metin Kortak
Updated on July 09, 2024

A Log Analysis Tutorial

Log analysis is the process of analyzing computer-generated record of events in a digital environment to identify suspicious activity. Learn how it works.

Image: Shutterstock / Built In
Brooke Becher Brooke Becher
Updated on July 08, 2024

18 Types of Cyber Attacks and How to Prevent Them

Know the signs of malicious activity and how it works to tread a lighter digital footprint.

Image: Shutterstock
Alex Tray Alex Tray
Updated on July 02, 2024

How to Use the SCP Command in Linux to Securely Transfer Files

Learn how to use the SCP command-line utility in Linux to ensure secure file copying and transfers from local systems to remote nodes and vice versa.

Image: Shutterstock / Built In
Sarah Gray Sarah Gray
Updated on June 25, 2024

These Cyber Attacks Could Have Been Prevented. Here’s How.

While cybersecurity threats continue to evolve, there are simple steps companies can take to protect themselves.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on June 24, 2024

31 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock
Margo Steines Margo Steines
Updated on June 22, 2024

14 Companies Hiring Cybersecurity Professionals

These cybersecurity jobs cover industries like insurance, automotive manufacturing and financial services.

Photo: Shutterstock
Katlyn Gallo Katlyn Gallo
Updated on June 20, 2024

Log4J Vulnerability Explained: What It Is and How to Fix It

The Log4j vulnerability arose in December 2021, exposing hundreds of thousands of systems to attack. Now, here’s where we are.

Image: Shutterstock / Built In
Tyler Owen Tyler Owen
Updated on June 04, 2024

IoT Security is a Challenge. Here’s How to Tackle It.

Our expert explores advanced strategies to shield the Internet of Things from evolving threats.

Image: Shutterstock / Built In