Cybersecurity + IT Articles

Sorted By: Most Recent
Erin Hamm Erin Hamm
Updated on March 17, 2025

The Crawl-Walk-Run Approach to Generative AI Security

Rushing to adopt the latest generative AI security tools can create larger problems in the future. Here’s why a slower, simpler approach is better. 

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on March 12, 2025

Navigating the Enterprise Challenge of Linux Management 

Linux offers a versatile operating system for developers and is useful for running AI and machine learning programs, but it can also create security headaches. Here’s what to know. 

Image: Shutterstock / Built In
Chintan Parikh Chintan Parikh
Updated on March 10, 2025

Understanding the Hidden Risks of AI Agent Adoption

AI agents promise to automate tasks and enhance efficiency, however they can also present unique security vulnerabilities. Here’s what to know.

Image: Shutterstock / Built In
Sebastian Straub Sebastian Straub
Updated on March 05, 2025

5 Ways Ransomware Will Change in 2025

Cybercriminals are finding it easier than ever before to get in the ransomware game. Our expert explains what that means and how to stay safe.

Image: Shutterstock / Built In
Matt Almassian Matt Almassian
Updated on March 04, 2025

Why Smart Companies Are Granting AI Immunity to Their Employees

Employees are using AI tools whether they’re authorized or not. Instead of cracking down on AI usage, consider developing an AI amnesty program. Learn more.

Image: Shutterstock / Built In
Thulasi Rangan Jayakumar Thulasi Rangan Jayakumar
Updated on February 19, 2025

What Is Anomaly Detection?

Anomaly detection involves finding deviations from expected patterns in order to proactively safeguard systems. Our expert explains how it works.

Image: Shutterstock / Built In
Margo Steines Margo Steines
Updated on February 13, 2025

22 Companies Hiring Entry-Level IT Professionals

Entry-level IT professionals can work across a variety of industries, ranging from financial services to pharmaceutical manufacturing.

Photo: Shutterstock
Metin Kortak Metin Kortak
Updated on February 13, 2025

How to Fix SSH ‘Connection Refused’ Error

An SSH ‘Connection Refused’ error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s how to fix it.

STOCK HOLD
Chintan Parikh Chintan Parikh
Updated on February 05, 2025

5 Cybersecurity Challenges Companies Must Navigate in 2025

The rise of intelligent social engineering attacks is just one of the cyber threats companies will need to prepare for in 2025. Here’s what leaders need to know.

Image: Shutterstock / Built In
Minghong Fang Minghong Fang
Updated on January 24, 2025

Federated Learning Has Security Holes. Here’s How to Fix Them.

Our expert presents solutions to poisoning attacks in distributed machine learning, ensuring that privacy and efficiency can go hand-in-hand.

Image: Shutterstock / Built In