Cybersecurity Articles

Sorted By: Most Recent
Andreas Rekdal Andreas Rekdal
Updated on April 08, 2025

New plug-and-play privacy device lets you opt out of giving away all your data

Winston Privacy, a cybersecurity startup based out of Chicago’s mHUB innovation center, has built a plug-and-play device that lets everyday internet users opt out of being tracked online.

Mike Cobb Mike Cobb
Updated on April 01, 2025

What Happens to Your Data When Companies Go Bankrupt?

23andMe’s bankruptcy filing has underscored a chilling reality for consumers: your personal data can be sold off as an asset when companies collapse, even after you delete it. Here’s what to know.

Image: Shutterstock / Built In
Stephen Ostrowski Stephen Ostrowski
Updated on March 27, 2025

Why Tech, Teamwork and Transparency Is Elemental to These Product Management Professionals

At this security company, “anybody can have a good idea.” How SailPoint employees seek to equip users with impactful product.

Illustration of people working together to put lightbulb puzzle pieces together
Metin Kortak Metin Kortak
Updated on March 26, 2025

How to Fix the SSH “Connection Refused” Error (With 5 Troubleshooting Methods)

An SSH “Connection Refused” error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s what can cause this error, troubleshooting tips, security best practices and more on how SSH works.

Image: Shutterstock / Built In
Nicky Watson Nicky Watson
Updated on March 25, 2025

How DOGE Puts Personal Data Privacy at Risk

The Department of Government Efficiency’s (DOGE) access to troves of personal data carries significant data privacy risks and could have far-reaching consequences. Learn more. 

Image: Shutterstock / Built In
Judith Etugbo Judith Etugbo
Updated on March 25, 2025

Why Zero-Knowledge Proofs Are the Future of Blockchain Security

A zero-knowledge proof is a cryptographic method that allows one party to provide provable information to the other party without revealing that information. Here’s how it works. 

Image: Shutterstock / Built In
Hal Koss Hal Koss
Updated on March 25, 2025

It’s Time to Adjust Your IT Strategy to Support a Remote Workforce

Start by optimizing tech stacks for new, asynchronous workflows.

It’s Time to Adjust Your IT Strategy to Support a Remote Workforce
Tammy Xu Tammy Xu
Updated on March 20, 2025

How to Stop a DDoS Attack: A Guide

Take these steps to stop a DDoS attack from hurting your company.

How to Stop a DDoS Attack: A Guide
Tatum Hunter Tatum Hunter
Updated on March 20, 2025

Deepfake Phishing: Is That Actually Your Boss Calling?

Deepfake technology is outpacing our ability to spot it. That could be bad news for cybersecurity.

Deepfake Phishing: Is That Actually Your Boss Calling?