IT Security Articles

Sorted By: Most Recent
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is Smishing?

Smishing is when an attacker uses text messages to trick victims into giving up money, personal information or installing malware. Here’s how you can protect yourself.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Molly Fosco Molly Fosco
Updated on April 20, 2024

The People-Centric Data Security Solutions Companies Are Prioritizing

As data protection becomes a more formal business priority, many organizations are using new tools to upgrade their online security.

Sascha Giese Sascha Giese
Updated on April 19, 2024

How Combining Observability With Edge Computing Ensures Greater Productivity

Edge computing offers faster data processing times, but introduces opacity into an IT system. Coupling it with observability can help ensure a smoother workflow.

Image: Shutterstock / Built In
Divanshu Khatter Divanshu Khatter
Updated on April 18, 2024

How to Web Scrape for Data Enrichment

When done ethically and compliantly, web scraping can significantly enhance data enrichment. Here’s how to do it.

Image: Shutterstock / Built In
Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
Krishna Subramanian Krishna Subramanian
Updated on April 10, 2024

Here’s How to Take Control of Your Unstructured Data

Bringing structure to unstructured data may sound like a paradox, but it’s more intuitive than you think.

Image: Shutterstock / Built In
John Funk John Funk
Updated on April 09, 2024

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

Image: Shutterstock / Built In