Cybersecurity + IT Articles

Sorted By: Most Recent
Shamael Zaheer Khan Shamael Zaheer Khan
Updated on August 12, 2024

How to Defend Against Deepfakes

As deepfakes become more prevalent, businesses need to protect against them. Here’s how to defend against deepfake attacks.

Image: Shutterstock / Built In
Akshay Kumar Akshay Kumar
Updated on August 09, 2024

SSH Port Forwarding (SSH Tunneling): How-To Guide

SSH port forwarding is a method for safely transmitting data over an encrypted SSH connection between a local and distant server. Here’s what to know.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on August 08, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
Ben Curtis Ben Curtis
Updated on August 08, 2024

How an Open Science Approach Benefits Technological Development

Using the field of fully homomorphic encryption, our expert looks at what an open science approach can do to grow a field.

Image: Shutterstock / Built In
Justin Hartland Justin Hartland
Updated on August 02, 2024

Thinking of Downsizing Your Domain Portfolio? Don’t.

Companies may be tempted to downsize unused domains, but that would be a mistake. Our expert explains why.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on July 09, 2024

A Log Analysis Tutorial

Log analysis is the process of analyzing computer-generated record of events in a digital environment to identify suspicious activity. Learn how it works.

Image: Shutterstock / Built In
Sarah Gray Sarah Gray
Updated on June 25, 2024

These Cyber Attacks Could Have Been Prevented. Here’s How.

While cybersecurity threats continue to evolve, there are simple steps companies can take to protect themselves.

Image: Shutterstock / Built In
Tyler Owen Tyler Owen
Updated on June 04, 2024

IoT Security is a Challenge. Here’s How to Tackle It.

Our expert explores advanced strategies to shield the Internet of Things from evolving threats.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on June 04, 2024

How to Attract, Train and Retain Blue Team Cybersecurity Talent

Cybersecurity teams need a good defense. Here’s how to find the players.

Image: Shutterstock / Built In
Gavin Quinn Gavin Quinn
Updated on May 30, 2024

Is Your CEO’s Social Media Presence Putting Your Company at Risk?

Social media is often a threat actor’s first stop, and no account is at more risk than a CEOs. Here’s how CEOs can protect their social media accounts and companies from cyber attacks.

Image: Shutterstock / Built In