Cybersecurity Frameworks Articles

Sorted By: Most Recent
Metin Kortak Metin Kortak
Updated on August 21, 2024

How to Securely Transfer Files Using SFTP

Secure file transfer protocol (SFTP) is a secure and encrypted method of transferring files over a network. Learn how it works.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on August 14, 2024

3 Ways to Protect Your Wearables and Rugged Devices From Cyber Attacks

It’s time to treat non-traditional endpoint security with the same urgency as smartphones and laptops. Here’s how.

Image: Shutterstock / Built In
Nicos Vekiarides Nicos Vekiarides
Updated on August 13, 2024

How Deepfakes Threaten the Integrity of the 2024 Election

Generative AI is making it increasingly difficult to discern real content from fake. As election season approaches, here’s how you can increase your vigilance.

Image: Shutterstock / Built In
Shamael Zaheer Khan Shamael Zaheer Khan
Updated on August 12, 2024

How to Defend Against Deepfakes

As deepfakes become more prevalent, businesses need to protect against them. Here’s how to defend against deepfake attacks.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on August 08, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
Nenad Zaric Nenad Zaric
Updated on July 23, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Sarah Gray Sarah Gray
Updated on June 25, 2024

These Cyber Attacks Could Have Been Prevented. Here’s How.

While cybersecurity threats continue to evolve, there are simple steps companies can take to protect themselves.

Image: Shutterstock / Built In
Tyler Owen Tyler Owen
Updated on June 04, 2024

IoT Security is a Challenge. Here’s How to Tackle It.

Our expert explores advanced strategies to shield the Internet of Things from evolving threats.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on May 07, 2024

How to Use Nmap to Scan for Open Ports

This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is SQL Injection?

SQL injection is a type of cyberattack that lets a criminal execute their own SQL queries on a database. Here are some examples.

Image: Shutterstock / Built In