Cybersecurity + IT Articles

Sorted By: Most Recent
Margo Steines Margo Steines
Updated on April 16, 2025

6 IT Companies in Montreal to Know

These leading Montreal IT companies offer expertise in areas ranging from custom software solutions to managed cybersecurity services.

Photo: Shutterstock
Metin Kortak Metin Kortak
Updated on March 26, 2025

How to Fix the SSH “Connection Refused” Error (With 5 Troubleshooting Methods)

An SSH “Connection Refused” error occurs when an attempt to connect to a remote server is denied, leading to significant security vulnerabilities. Here’s what can cause this error, troubleshooting tips, security best practices and more on how SSH works.

Image: Shutterstock / Built In
Nicky Watson Nicky Watson
Updated on March 25, 2025

How DOGE Puts Personal Data Privacy at Risk

The Department of Government Efficiency’s (DOGE) access to troves of personal data carries significant data privacy risks and could have far-reaching consequences. Learn more. 

Image: Shutterstock / Built In
Erin Hamm Erin Hamm
Updated on March 17, 2025

The Crawl-Walk-Run Approach to Generative AI Security

Rushing to adopt the latest generative AI security tools can create larger problems in the future. Here’s why a slower, simpler approach is better. 

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on March 12, 2025

Navigating the Enterprise Challenge of Linux Management 

Linux offers a versatile operating system for developers and is useful for running AI and machine learning programs, but it can also create security headaches. Here’s what to know. 

Image: Shutterstock / Built In
Chintan Parikh Chintan Parikh
Updated on March 10, 2025

Understanding the Hidden Risks of AI Agent Adoption

AI agents promise to automate tasks and enhance efficiency, however they can also present unique security vulnerabilities. Here’s what to know.

Image: Shutterstock / Built In
Sebastian Straub Sebastian Straub
Updated on March 05, 2025

5 Ways Ransomware Will Change in 2025

Cybercriminals are finding it easier than ever before to get in the ransomware game. Our expert explains what that means and how to stay safe.

Image: Shutterstock / Built In
Matt Almassian Matt Almassian
Updated on March 04, 2025

Why Smart Companies Are Granting AI Immunity to Their Employees

Employees are using AI tools whether they’re authorized or not. Instead of cracking down on AI usage, consider developing an AI amnesty program. Learn more.

Image: Shutterstock / Built In
Thulasi Rangan Jayakumar Thulasi Rangan Jayakumar
Updated on February 19, 2025

What Is Anomaly Detection?

Anomaly detection involves finding deviations from expected patterns in order to proactively safeguard systems. Our expert explains how it works.

Image: Shutterstock / Built In
Margo Steines Margo Steines
Updated on February 13, 2025

22 Companies Hiring Entry-Level IT Professionals

Entry-level IT professionals can work across a variety of industries, ranging from financial services to pharmaceutical manufacturing.

Photo: Shutterstock