Cybersecurity + IT Articles

Sorted By: Most Recent
Nenad Zaric Nenad Zaric
Updated on July 23, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on July 09, 2024

A Log Analysis Tutorial

Log analysis is the process of analyzing computer-generated record of events in a digital environment to identify suspicious activity. Learn how it works.

Image: Shutterstock / Built In
Sarah Gray Sarah Gray
Updated on June 25, 2024

These Cyber Attacks Could Have Been Prevented. Here’s How.

While cybersecurity threats continue to evolve, there are simple steps companies can take to protect themselves.

Image: Shutterstock / Built In
Tyler Owen Tyler Owen
Updated on June 04, 2024

IoT Security is a Challenge. Here’s How to Tackle It.

Our expert explores advanced strategies to shield the Internet of Things from evolving threats.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on June 04, 2024

How to Attract, Train and Retain Blue Team Cybersecurity Talent

Cybersecurity teams need a good defense. Here’s how to find the players.

Image: Shutterstock / Built In
Gavin Quinn Gavin Quinn
Updated on May 30, 2024

Is Your CEO’s Social Media Presence Putting Your Company at Risk?

Social media is often a threat actor’s first stop, and no account is at more risk than a CEOs. Here’s how CEOs can protect their social media accounts and companies from cyber attacks.

Image: Shutterstock / Built In
Charath Ranganathan Charath Ranganathan
Updated on May 14, 2024

Why Your Company Should Be Using CodeOps

CodeOps is a new and improved way to secure your development process.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on May 07, 2024

How to Use Nmap to Scan for Open Ports

This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is Smishing?

Smishing is when an attacker uses text messages to trick victims into giving up money, personal information or installing malware. Here’s how you can protect yourself.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In