Cybersecurity Articles

Sorted By: Most Recent
Sam Daley Sam Daley
Updated on May 20, 2024

26 Top Cloud Security Companies to Know

Cybersecurity for the cloud is important for your business. Here are companies that specialize in it.

Image: Shutterstock
Mae Rice Mae Rice
Updated on May 20, 2024

25 Cybersecurity Tools You Should Know

With cyberattacks on the rise, equip yourself with these cybersecurity tools.

Image: Shuttershock
Alyssa Schroer Alyssa Schroer
Updated on May 20, 2024

AI Cybersecurity: 31 Companies to Know

These AI cybersecurity solutions save time and money by providing IT and security teams with tools to protect data and networks against cyber attacks.

Image: Shutterstock
Khurram Mir Khurram Mir
Updated on May 14, 2024

Can Rogue AI Become a Threat to Cybersecurity?

Without human intelligence, it sure can. Our expert explains why prevention is the best cure.

Image: Shutterstock / Built In
Charath Ranganathan Charath Ranganathan
Updated on May 14, 2024

Why Your Company Should Be Using CodeOps

CodeOps is a new and improved way to secure your development process.

Image: Shutterstock / Built In
Will Teevan Will Teevan
Updated on May 14, 2024

Unpatched Software Is a Huge Cybersecurity Risk. Here’s How to Address It.

Software patching is a quick, inexpensive way to prevent cyber attacks.

Image: Shutterstock / Built In
Mike Thomas Mike Thomas
Updated on May 14, 2024

62 Top Cybersecurity Companies to Know

These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.

Image: Shutterstock
Brian Nordli Brian Nordli
Updated on May 10, 2024

What Is a Digital Footprint?

There’s no such thing as online privacy. But here's how you can limit your exposure.

Image: Shutterstock
Dinesh Kumar K.B. Dinesh Kumar K.B.
Updated on May 07, 2024

JWT Decoded: A Guide

JSON web token (JWT) is an open standard used to safely share encrypted information between a client and a server. Learn how to decode JWT using Python.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on May 07, 2024

How to Use Nmap to Scan for Open Ports

This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.

Image: Shutterstock / Built In