IT Security Articles

Sorted By: Most Recent
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Sean Tilley Sean Tilley
Updated on December 06, 2024

Everything You Need to Know About the 2025 Digital Operational Resilience Act

What is DORA, and how can you prepare for it?

Image: Shutterstock / Built In
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
William Baptist William Baptist
Updated on December 06, 2024

How to Create a VPN for Free

A virtual private network (VPN) is a privacy tool that disguises user IP addresses and encrypts their browsing data. Learn how to build your own.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
Tomer Filiba Tomer Filiba
Updated on November 25, 2024

3 Cloud Security Hacks to Prevent Hacks

When SecOps teams are stretched thin, here are three high impact ways DevOps teams can help them curb cloud risks.

Image: Shutterstock / Built In
T.K. Keanini T.K. Keanini
Updated on November 21, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Brandon Wiebe Brandon Wiebe
Updated on November 08, 2024

Does Your Organization Need a Field Chief Privacy Officer?

The field CPO is the connective tissue between companies, focused on education, advocacy and community. Here’s what to know if you’re thinking of hiring for the role.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on October 17, 2024

How to Fix SSH ‘Connection Refused’ Error

An SSH ‘Connection Refused’ error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s how to fix it.

STOCK HOLD
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In