Cybersecurity + IT Articles

Sorted By: Most Recent
Mohamed Khey Mohamed Khey
Updated on February 20, 2024

How to Connect to SSH Without a Password

Secure shell protocol (SSH) enables secure data connection and remote command execution. Here’s how to configure SSH for passwordless logins. 

Image: Shutterstock / Built In
Matias Madou Matias Madou
Updated on January 24, 2024

Do Your Developers Have Enough Time for Security Training?

Investing in secure code training for developers can reap big rewards in the face of a challenging threat landscape, but only if people have the time they need to learn meaningful lessons.

Image: Shutterstock / Built In
Aimei Wei Aimei Wei
Updated on December 20, 2023

Why You Should Adopt Open XDR into Your Cybersecurity Strategy

It’s not enough just to have lots of strong tools anymore.

Image: Shutterstock / Built In
James Stanger James Stanger
Updated on December 19, 2023

How to Reduce Technical Debt and Bolster Your Cybersecurity

Failing to integrate IT best practices and team members into technical decisions can lead to ransomware attacks, data breaches and more. Here’s how to fix it.

Image: Shutterstock / Built In
Kapil Tandon Kapil Tandon
Updated on November 01, 2023

Are Your Generative AI Tools Doing More Harm Than Good?

Generative AI promises greater efficiency, but without a plan, it could end up being a high-powered spam machine creating more work. Here’s how.

Image: Shutterstock / Built In
Nitin Garg Nitin Garg
Updated on October 19, 2023

3 Ways AI Will Change the Workplace in 2024

With AI becoming commonplace, what does the near future of work look like?

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on September 27, 2023

What Is a CDN?

Chances are you interact with CDNs (content delivery networks) on a daily basis, but what exactly is a CDN and how does it work? Our expert explains.

Image: Shutterstock / Built In
Tamas Kadar Tamas Kadar
Updated on September 27, 2023

AI-Driven Fraud Is on the Rise. Here’s How to Combat It.

AI is being used to create fake identities, send convincing phishing emails and even clone voices to steal user data and money. Fighting it starts with awareness.  

Image: Shutterstock / Built In
Nikita Fedorov Nikita Fedorov
Updated on May 03, 2023

4 Tips to Improve Efficiency for Remote Developers

Remote work is here to stay in the IT world, so make sure you set your software developers up for success by following these principles.

Image: Shutterstock / Built In
Estefanía García Gallardo Estefanía García Gallardo
Updated on March 28, 2023

What Is File Transfer Protocol (FTP)?

File transfer protocol has been around for many years and is largely used to share files over the internet. Here’s how it works and why we still use it.

Image: Shutterstock / Built In