Cybersecurity + IT Articles

Sorted By: Most Recent
Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

How to Break Into Cybersecurity

Cybersecurity is a vital and rapidly growing field, but getting a foot in the door can be hard for beginners. Follow these tips to make landing your first role easier.

Eitan Worcel Eitan Worcel
Updated on April 20, 2024

Can AI Solve the Growing Cybersecurity Shortage?

Despite record numbers of cybersecurity professionals, the workforce can’t expand fast enough to meet the field’s needs. It’s time the industry embraces AI to close the gap.   

Image: Shutterstock / Built In
Andrey Koptelov Andrey Koptelov
Updated on April 20, 2024

Why AI Is the New Front Line in Cybersecurity

As artificial intelligence and machine learning become more common in cyber attacks, the technologies will also have a larger role to play in hardening defenses.

Image: Shutterstock / Built In
 Neal Davis Neal Davis
Updated on April 19, 2024

7 Non-Technical Roles That Need AWS Cloud Skills

As cloud computing has grown in importance, everyone from project managers and sales reps to CFOs and CEOs need to develop cloud skills. Here’s why.

Image: Shutterstock / Built In
Neko Papez Neko Papez
Updated on April 15, 2024

Weaponized Files: The Latest Cybersecurity Threat Explained

Weaponized files are files that have been injected with malware to compromise devices and steal data. Learn how it works and how to stop it.  

Image: Shutterstock / Built In
Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
John Funk John Funk
Updated on April 09, 2024

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 09, 2024

13 Tips to Secure Your Company’s Social Media Accounts

No one is safe from social media cyber attacks. Take these steps to keep your company’s accounts safe.

Image: Shutterstock / Built In
Andrei Neacsu Andrei Neacsu
Updated on April 08, 2024

The OSI Model’s 7 Layers, Explained

The seven layers in the Open Systems Interconnection (OSI) model each serve a specific function and work together to create an efficient network communication system.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on April 08, 2024

What Is End-to-End Encryption?

End-to-end encryption is a secure communication method that allows only the sender and intended recipient to access the contents of a message or file. Here’s how it works.

Image: Built In / Shutterstock