Cybersecurity + IT Articles

Sorted By: Most Recent
Kumar Goswami Kumar Goswami
Updated on June 13, 2025

You’re Probably Ignoring a Vulnerability That Could Cost You Millions in Ransomware Attacks

Companies often forget to protect unstructured file data, which makes it an ideal attack surface. Our expert tells you how to stay safe.

Image: Shutterstock / Built In
Éireann Leverett Éireann Leverett
Updated on June 05, 2025

How Cybersecurity Teams Can Stay Ahead in 2025 and Beyond

Chat logs from cyber threat group Black Basta reveal that a company’s greatest vulnerability is its overlooked infrastructure. Here’s what that means for cybersecurity defense.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on May 27, 2025

Best Practices for Secure Kotlin App Development

As Kotlin is quickly becoming a popular and highly paid language, our expert shares some tips for building secure products with it.

Image: Shutterstock / Built In
Giorgos Myrianthous Giorgos Myrianthous
Updated on May 20, 2025

What Is Prompt Injection?

Prompt injection is a cyberattack that takes advantage of the greatest strength of an LLM: Its ability to understand natural language. Our expert details how it works and how to guard against it.

Image: Shutterstock / Built In
Esben Dochy Esben Dochy
Updated on April 21, 2025

When Is the Right Time to Upgrade Your Network Equipment?

Aging network equipment opens your business to a myriad of vulnerabilities. Our expert shares advice for managing it proactively.

Image: Shutterstock / Built In
Toni de la Fuente Toni de la Fuente
Updated on April 17, 2025

Why Open Source Is the Future of Cloud Protection

Open-source cloud security tools offer increased transparency, flexibility and control. Here’s why it might signal the end of black-box security solutions.

Image: Shutterstock / Built In
Margo Steines Margo Steines
Updated on April 16, 2025

6 IT Companies in Montreal to Know

These leading Montreal IT companies offer expertise in areas ranging from custom software solutions to managed cybersecurity services.

Photo: Shutterstock
Metin Kortak Metin Kortak
Updated on March 26, 2025

How to Fix the SSH “Connection Refused” Error (With 5 Troubleshooting Methods)

An SSH “Connection Refused” error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s what can cause this error, troubleshooting tips, security best practices and more on how SSH works.

Image: Shutterstock / Built In
Nicky Watson Nicky Watson
Updated on March 25, 2025

How DOGE Puts Personal Data Privacy at Risk

The Department of Government Efficiency’s (DOGE) access to troves of personal data carries significant data privacy risks and could have far-reaching consequences. Learn more. 

Image: Shutterstock / Built In
Erin Hamm Erin Hamm
Updated on March 17, 2025

The Crawl-Walk-Run Approach to Generative AI Security

Rushing to adopt the latest generative AI security tools can create larger problems in the future. Here’s why a slower, simpler approach is better. 

Image: Shutterstock / Built In