Cybersecurity + IT Articles

Sorted By: Most Recent
Margo Steines Margo Steines
Updated on November 06, 2025

23 Companies Hiring Entry-Level IT Professionals

Entry-level IT professionals can work across a variety of industries, ranging from financial services to pharmaceutical manufacturing.

Photo: Shutterstock
Alex Vakulov Alex Vakulov
Updated on November 06, 2025

How to Improve Your Cloud Security in 2026

As multicloud deployments become more common, security threats are amplified. Our expert outlines how to stay ahead of the risks.

Image: Shutterstock / Built In
Kevin Tian Kevin Tian
Updated on November 04, 2025

How to Spot and Avoid Fake Job Offers Before They Cost You

Scammers are taking advantage of high unemployment to deploy increasingly sophisticated scams. Our expert has advice for staying safe.

Image: Shutterstock / Built In
Mark Flegg Mark Flegg
Updated on October 29, 2025

Addressing the Security Risks of Decentralized Domain Management

A lack of coordination around domain management can expose an organization’s cybersecurity risk, yet it often gets overlooked. Here’s what you can do about it.

Image: Shutterstock / Built In
Daniel Pearson Daniel Pearson
Updated on September 30, 2025

How to Prevent Piggybacking Attacks in Your Network

Piggybacking attacks occur when a user exploits trust to breach physical or digital security to access sensitive data, install malware or compromise the system. Here’s how to prevent it.    

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on September 22, 2025

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control (DAC) is a security model where the owner of a resource grants users permission to access that resource.

Image: Shutterstock / Built In
Steve Wilson Steve Wilson
Updated on September 17, 2025

What Hollywood’s AI Horror Stories Tell Us About Safety vs. Security

Two recent movies illustrate the various risks that may accompany the widespread adoption of AI.

Image: Shutterstock / Built In
Murali Sastry Murali Sastry
Updated on September 15, 2025

How to Vibe Code Without Creating Security Problems

As vibe coding becomes common practice for developers, these best practices will help keep your products safe.

Image Shutterstock / Built In
Dawn Kawamoto Dawn Kawamoto
Updated on September 15, 2025

Your Pathway Into a Cybersecurity Job Is Changing

An increasing number of Gen Z and millennials are going beyond the traditional IT-to-cybersecurity career path. Should you?

Julius Černiauskas Julius Černiauskas
Updated on September 11, 2025

Why Information Sharing Is Crucial to Better Cybersecurity

Cybercriminals have developed sophisticated collaboration networks. Stopping them will require businesses to do the same.

Image: Shutterstock / Built In