Cybersecurity + IT Articles

Sorted By: Most Recent
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
William Baptist William Baptist
Updated on December 06, 2024

How to Create a VPN for Free

A virtual private network (VPN) is a privacy tool that disguises user IP addresses and encrypts their browsing data. Learn how to build your own.

Image: Shutterstock / Built In
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 26, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
Tomer Filiba Tomer Filiba
Updated on November 25, 2024

3 Cloud Security Hacks to Prevent Hacks

When SecOps teams are stretched thin, here are three high impact ways DevOps teams can help them curb cloud risks.

Image: Shutterstock / Built In
T.K. Keanini T.K. Keanini
Updated on November 21, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Nenad Zaric Nenad Zaric
Updated on November 19, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Mohamed Khey Mohamed Khey
Updated on November 19, 2024

How to Connect to SSH Without a Password

Secure shell protocol (SSH) enables secure data connection and remote command execution. Here’s how to configure SSH for passwordless logins.

Image: Shutterstock / Built In
Nick Ascoli Nick Ascoli
Updated on November 12, 2024

How to Use AI and LLMs to Eavesdrop on Potential Attackers

Cybercriminals constantly upgrade their methods of attack, and their increasing sophistication can be exacerbated by language barriers and the ever-present time and money crunch. Our expert explains how new AI tools can help you solve these problems.

Image: Shutterstock / Built In
Brandon Wiebe Brandon Wiebe
Updated on November 08, 2024

Does Your Organization Need a Field Chief Privacy Officer?

The field CPO is the connective tissue between companies, focused on education, advocacy and community. Here’s what to know if you’re thinking of hiring for the role.

Image: Shutterstock / Built In