Cybersecurity + IT Articles

Sorted By: Most Recent
T.K. Keanini T.K. Keanini
Updated on November 19, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Nenad Zaric Nenad Zaric
Updated on November 19, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 19, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
Mohamed Khey Mohamed Khey
Updated on November 19, 2024

How to Connect to SSH Without a Password

Secure shell protocol (SSH) enables secure data connection and remote command execution. Here’s how to configure SSH for passwordless logins.

Image: Shutterstock / Built In
Nick Ascoli Nick Ascoli
Updated on November 12, 2024

How to Use AI and LLMs to Eavesdrop on Potential Attackers

Cybercriminals constantly upgrade their methods of attack, and their increasing sophistication can be exacerbated by language barriers and the ever-present time and money crunch. Our expert explains how new AI tools can help you solve these problems.

Image: Shutterstock / Built In
Brandon Wiebe Brandon Wiebe
Updated on November 08, 2024

Does Your Organization Need a Field Chief Privacy Officer?

The field CPO is the connective tissue between companies, focused on education, advocacy and community. Here’s what to know if you’re thinking of hiring for the role.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on October 30, 2024

What Is Cybersecurity?

Cybersecurity is the practice of using experts and tools as a multi-layered defense to protect networks, systems, hardware and data from digital attacks.

Image: Shutterstock
Margo Steines Margo Steines
Updated on October 28, 2024

14 Companies Hiring Entry-Level IT Professionals

Entry-level IT professionals can work across a variety of industries, ranging from financial services to pharmaceutical manufacturing.

Photo: Shutterstock
Metin Kortak Metin Kortak
Updated on October 17, 2024

How to Fix SSH ‘Connection Refused’ Error

An SSH ‘Connection Refused’ error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s how to fix it.

STOCK HOLD
Sascha Giese Sascha Giese
Updated on October 09, 2024

How to Exorcise the Modern Horrors of IT

Your average IT team faces as many shadowy monsters as a camper in a horror movie. Our expert gives you some tools to battle back against them.

Image: Shutterstock / Built In