IT Security Articles

Sorted By: Most Recent
Shamael Zaheer Khan Shamael Zaheer Khan
Updated on July 17, 2024

How to Defend Against Deepfakes

As deepfakes become more prevalent, businesses need to protect against them. Here’s how to defend against deepfake attacks.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on July 09, 2024

A Log Analysis Tutorial

Log analysis is the process of analyzing computer-generated record of events in a digital environment to identify suspicious activity. Learn how it works.

Image: Shutterstock / Built In
Charath Ranganathan Charath Ranganathan
Updated on May 14, 2024

Why Your Company Should Be Using CodeOps

CodeOps is a new and improved way to secure your development process.

Image: Shutterstock / Built In
Will Teevan Will Teevan
Updated on May 14, 2024

Unpatched Software Is a Huge Cybersecurity Risk. Here’s How to Address It.

Software patching is a quick, inexpensive way to prevent cyber attacks.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is Smishing?

Smishing is when an attacker uses text messages to trick victims into giving up money, personal information or installing malware. Here’s how you can protect yourself.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Molly Fosco Molly Fosco
Updated on April 20, 2024

The People-Centric Data Security Solutions Companies Are Prioritizing

As data protection becomes a more formal business priority, many organizations are using new tools to upgrade their online security.

Sascha Giese Sascha Giese
Updated on April 19, 2024

How Combining Observability With Edge Computing Ensures Greater Productivity

Edge computing offers faster data processing times, but introduces opacity into an IT system. Coupling it with observability can help ensure a smoother workflow.

Image: Shutterstock / Built In