IT Security Articles

Sorted By: Most Recent
Zak Edwards Zak Edwards
Updated on August 25, 2025

What Is Smishing?

Smishing (or SMS phishing) is a form of phishing where attackers use text messages to deceive individuals into sharing sensitive information, sending money or downloading malicious software.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on August 25, 2025

What Is a CDN (Content Delivery Network)?

A content delivery network (CDN) is a geographically distributed system of servers that cache and deliver web content to users based on their location to improve speed, reliability and security.

Image: Shutterstock / Built In
Russ Munisteri Russ Munisteri
Updated on July 30, 2025

Laid Off From IT? How to Transfer to a Cybersecurity Role.

Cybersecurity careers are often a perfect fit for IT professionals thanks to its mix of growth opportunities and similar skill sets. Here’s how to make the leap.   

Image: Shutterstock / Built In
Matt Hillary Matt Hillary
Updated on May 21, 2025

Automate Your Governance, Risk and Compliance Processes

Despite advancements in GRC automation, too many companies still allow it to be a slow and cumbersome process. Our expert explains how to embrace the future.

Image: Shutterstock / Built In
Esben Dochy Esben Dochy
Updated on April 21, 2025

When Is the Right Time to Upgrade Your Network Equipment?

Aging network equipment opens your business to a myriad of vulnerabilities. Our expert shares advice for managing it proactively.

Image: Shutterstock / Built In
Toni de la Fuente Toni de la Fuente
Updated on April 17, 2025

Why Open Source Is the Future of Cloud Protection

Open-source cloud security tools offer increased transparency, flexibility and control. Here’s why it might signal the end of black-box security solutions.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on March 26, 2025

How to Fix the SSH “Connection Refused” Error (With 5 Troubleshooting Methods)

An SSH “Connection Refused” error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s what can cause this error, troubleshooting tips, security best practices and more on how SSH works.

Image: Shutterstock / Built In
Sandra Matz Sandra Matz
Updated on January 22, 2025

The Case for Privacy by Design

Do you dream of a future where you can opt-in to share your data — instead of opting out? It could be closer than you think.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Sean Tilley Sean Tilley
Updated on December 06, 2024

Everything You Need to Know About the 2025 Digital Operational Resilience Act

What is DORA, and how can you prepare for it?

Image: Shutterstock / Built In