Cybersecurity + IT Articles

Sorted By: Most Recent
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
Tomer Filiba Tomer Filiba
Updated on November 25, 2024

3 Cloud Security Hacks to Prevent Hacks

When SecOps teams are stretched thin, here are three high impact ways DevOps teams can help them curb cloud risks.

Image: Shutterstock / Built In
T.K. Keanini T.K. Keanini
Updated on November 21, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Nenad Zaric Nenad Zaric
Updated on November 19, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Mohamed Khey Mohamed Khey
Updated on November 19, 2024

How to Connect to SSH Without a Password

Secure shell protocol (SSH) enables secure data connection and remote command execution. Here’s how to configure SSH for passwordless logins.

Image: Shutterstock / Built In
Nick Ascoli Nick Ascoli
Updated on November 12, 2024

How to Use AI and LLMs to Eavesdrop on Potential Attackers

Cybercriminals constantly upgrade their methods of attack, and their increasing sophistication can be exacerbated by language barriers and the ever-present time and money crunch. Our expert explains how new AI tools can help you solve these problems.

Image: Shutterstock / Built In
Brandon Wiebe Brandon Wiebe
Updated on November 08, 2024

Does Your Organization Need a Field Chief Privacy Officer?

The field CPO is the connective tissue between companies, focused on education, advocacy and community. Here’s what to know if you’re thinking of hiring for the role.

Image: Shutterstock / Built In
Sam Daley Sam Daley
Updated on October 30, 2024

What Is Cybersecurity?

Cybersecurity is the practice of using experts and tools as a multi-layered defense to protect networks, systems, hardware and data from digital attacks.

Image: Shutterstock
Sascha Giese Sascha Giese
Updated on October 09, 2024

How to Exorcise the Modern Horrors of IT

Your average IT team faces as many shadowy monsters as a camper in a horror movie. Our expert gives you some tools to battle back against them.

Image: Shutterstock / Built In