Cybersecurity + IT Articles

Sorted By: Most Recent
Margo Steines Margo Steines
Updated on July 25, 2024

6 Companies Hiring Entry-Level IT Professionals

Entry-level IT professionals can work across a variety of industries, ranging from financial services to pharmaceutical manufacturing.

Photo: Shutterstock
Nenad Zaric Nenad Zaric
Updated on July 23, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on July 23, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
Shamael Zaheer Khan Shamael Zaheer Khan
Updated on July 17, 2024

How to Defend Against Deepfakes

As deepfakes become more prevalent, businesses need to protect against them. Here’s how to defend against deepfake attacks.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on July 09, 2024

A Log Analysis Tutorial

Log analysis is the process of analyzing computer-generated record of events in a digital environment to identify suspicious activity. Learn how it works.

Image: Shutterstock / Built In
Alex Tray Alex Tray
Updated on July 02, 2024

How to Use the SCP Command in Linux to Securely Transfer Files

Learn how to use the SCP command-line utility in Linux to ensure secure file copying and transfers from local systems to remote nodes and vice versa.

Image: Shutterstock / Built In
Sarah Gray Sarah Gray
Updated on June 25, 2024

These Cyber Attacks Could Have Been Prevented. Here’s How.

While cybersecurity threats continue to evolve, there are simple steps companies can take to protect themselves.

Image: Shutterstock / Built In
Tyler Owen Tyler Owen
Updated on June 04, 2024

IoT Security is a Challenge. Here’s How to Tackle It.

Our expert explores advanced strategies to shield the Internet of Things from evolving threats.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on June 04, 2024

How to Attract, Train and Retain Blue Team Cybersecurity Talent

Cybersecurity teams need a good defense. Here’s how to find the players.

Image: Shutterstock / Built In
Gavin Quinn Gavin Quinn
Updated on May 30, 2024

Is Your CEO’s Social Media Presence Putting Your Company at Risk?

Social media is often a threat actor’s first stop, and no account is at more risk than a CEOs. Here’s how CEOs can protect their social media accounts and companies from cyber attacks.

Image: Shutterstock / Built In