IT Security Articles

Sorted By: Most Recent
Matt Hillary Matt Hillary
Updated on May 21, 2025

Automate Your Governance, Risk and Compliance Processes

Despite advancements in GRC automation, too many companies still allow it to be a slow and cumbersome process. Our expert explains how to embrace the future.

Image: Shutterstock / Built In
Esben Dochy Esben Dochy
Updated on April 21, 2025

When Is the Right Time to Upgrade Your Network Equipment?

Aging network equipment opens your business to a myriad of vulnerabilities. Our expert shares advice for managing it proactively.

Image: Shutterstock / Built In
Toni de la Fuente Toni de la Fuente
Updated on April 17, 2025

Why Open Source Is the Future of Cloud Protection

Open-source cloud security tools offer increased transparency, flexibility and control. Here’s why it might signal the end of black-box security solutions.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on March 26, 2025

How to Fix the SSH “Connection Refused” Error (With 5 Troubleshooting Methods)

An SSH “Connection Refused” error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s what can cause this error, troubleshooting tips, security best practices and more on how SSH works.

Image: Shutterstock / Built In
Sandra Matz Sandra Matz
Updated on January 22, 2025

The Case for Privacy by Design

Do you dream of a future where you can opt-in to share your data — instead of opting out? It could be closer than you think.

Image: Shutterstock / Built In
Roman Davydov Roman Davydov
Updated on December 17, 2024

How to Build Secure Custom Enterprise Software

Custom enterprise software can expose a company to significant cybersecurity risks. Follow these steps to build a more secure solution.

Image: Shutterstock / Built In
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
William Baptist William Baptist
Updated on December 06, 2024

How to Create a VPN for Free

A virtual private network (VPN) is a privacy tool that disguises user IP addresses and encrypts their browsing data. Learn how to build your own.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In