Cybersecurity Articles

Sorted By: Most Recent
Margo Steines Margo Steines
Updated on February 21, 2025

39 Companies Hiring Cybersecurity Professionals

These cybersecurity jobs cover industries like insurance, automotive manufacturing and financial services.

Photo: Shutterstock
Thulasi Rangan Jayakumar Thulasi Rangan Jayakumar
Updated on February 19, 2025

What Is Anomaly Detection?

Anomaly detection involves finding deviations from expected patterns in order to proactively safeguard systems. Our expert explains how it works.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on February 18, 2025

Log4j Vulnerability Explained: What It Is and How to Fix It

The Log4j vulnerability is a software vulnerability in Log4j — an open-source library commonly used in Java-based systems and applications. Here’s how the vulnerability works, the response to and impact of the vulnerability and tips to mitigate it.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on February 13, 2025

How to Fix SSH ‘Connection Refused’ Error

An SSH ‘Connection Refused’ error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s how to fix it.

STOCK HOLD
Sam Daley Sam Daley
Updated on February 13, 2025

17 Cybersecurity Consulting Firms Safeguarding Our Data

Cybersecurity consulting services are helping companies create a digital security foundation.

Image: Shuttershock
Sam Daley Sam Daley
Updated on February 11, 2025

22 Blockchain in Cybersecurity Examples

These companies are using blockchain in cybersecurity to provide unprecedented protection for digital assets.

Image: Shutterstock / Built In
Chintan Parikh Chintan Parikh
Updated on February 05, 2025

5 Cybersecurity Challenges Companies Must Navigate in 2025

The rise of intelligent social engineering attacks is just one of the cyber threats companies will need to prepare for in 2025. Here’s what leaders need to know.

Image: Shutterstock / Built In
Judith Etugbo Judith Etugbo
Updated on January 31, 2025

Why Multi-Signature Crypto Wallets Are Crucial for Blockchain Security

A multi-signature crypto wallet is a form of crypto security that requires at least two or more passkeys from different cosigners to unlock. Here’s how they work.

Image: Shutterstock / Built In
Ellen Glover Ellen Glover
Updated on January 29, 2025

21 Encryption Solution Companies to Know

With the power of encryption, these companies are keeping the world’s data safe.

Image: Shutterstock / Built in
Katlyn Gallo Katlyn Gallo
Updated on January 27, 2025

What Is Hashing? A Guide With Examples.

Hashing uses an algorithm to transform input data of any size into a value of fixed length that is extremely difficult to decode. Here’s how hashing is used, its benefits and downsides and why it matters in cybersecurity.

Image: Shutterstock / Built In