Cybersecurity + IT Articles

Sorted By: Most Recent
Andrey Koptelov Andrey Koptelov
Updated on April 20, 2024

Why AI Is the New Front Line in Cybersecurity

As artificial intelligence and machine learning become more common in cyber attacks, the technologies will also have a larger role to play in hardening defenses.

Image: Shutterstock / Built In
 Neal Davis Neal Davis
Updated on April 19, 2024

7 Non-Technical Roles That Need AWS Cloud Skills

As cloud computing has grown in importance, everyone from project managers and sales reps to CFOs and CEOs need to develop cloud skills. Here’s why.

Image: Shutterstock / Built In
Neko Papez Neko Papez
Updated on April 15, 2024

Weaponized Files: The Latest Cybersecurity Threat Explained

Weaponized files are files that have been injected with malware to compromise devices and steal data. Learn how it works and how to stop it.  

Image: Shutterstock / Built In
Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
John Funk John Funk
Updated on April 09, 2024

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 09, 2024

13 Tips to Secure Your Company’s Social Media Accounts

No one is safe from social media cyber attacks. Take these steps to keep your company’s accounts safe.

Image: Shutterstock / Built In
Mae Rice Mae Rice
Updated on April 08, 2024

19 Top Cybersecurity Training Programs and Online Courses to Know

These courses cover everything from malware analysis to cloud security.

Image: Shutterstock
Brand Studio Logo
Andrei Neacsu Andrei Neacsu
Updated on April 08, 2024

The OSI Model’s 7 Layers, Explained

The seven layers in the Open Systems Interconnection (OSI) model each serve a specific function and work together to create an efficient network communication system.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 08, 2024

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control, or DAC, is an approach to systems security in which administrators grant users permission to access resources. Our expert explains how it works here.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on April 08, 2024

What Is End-to-End Encryption?

End-to-end encryption is a secure communication method that allows only the sender and intended recipient to access the contents of a message or file. Here’s how it works.

Image: Built In / Shutterstock