Cybersecurity + IT Articles

Sorted By: Most Recent
Alex Tray Alex Tray
Updated on August 28, 2024

How to Use the SCP Command in Linux to Securely Transfer Files

Learn how to use the SCP command-line utility in Linux to ensure secure file copying and transfers from local systems to remote nodes and vice versa.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on August 21, 2024

How to Securely Transfer Files Using SFTP

Secure file transfer protocol (SFTP) is a secure and encrypted method of transferring files over a network. Learn how it works.

Image: Shutterstock / Built In
Apu Pavithran Apu Pavithran
Updated on August 14, 2024

3 Ways to Protect Your Wearables and Rugged Devices From Cyber Attacks

It’s time to treat non-traditional endpoint security with the same urgency as smartphones and laptops. Here’s how.

Image: Shutterstock / Built In
Shamael Zaheer Khan Shamael Zaheer Khan
Updated on August 13, 2024

Navigating the Hype, Hope and Doom of OpenAI’s Sora

OpenAI’s new video generating model Sora is almost here, creating both excitement and fear over its potential. Here’s what to expect from the new AI tool.

Image: Shutterstock / Built In
Nicos Vekiarides Nicos Vekiarides
Updated on August 13, 2024

How Deepfakes Threaten the Integrity of the 2024 Election

Generative AI is making it increasingly difficult to discern real content from fake. As election season approaches, here’s how you can increase your vigilance.

Image: Shutterstock / Built In
Shamael Zaheer Khan Shamael Zaheer Khan
Updated on August 12, 2024

How to Defend Against Deepfakes

As deepfakes become more prevalent, businesses need to protect against them. Here’s how to defend against deepfake attacks.

Image: Shutterstock / Built In
Akshay Kumar Akshay Kumar
Updated on August 09, 2024

SSH Port Forwarding (SSH Tunneling): How-To Guide

SSH port forwarding is a method for safely transmitting data over an encrypted SSH connection between a local and distant server. Here’s what to know.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on August 08, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
Ben Curtis Ben Curtis
Updated on August 08, 2024

How an Open Science Approach Benefits Technological Development

Using the field of fully homomorphic encryption, our expert looks at what an open science approach can do to grow a field.

Image: Shutterstock / Built In
Justin Hartland Justin Hartland
Updated on August 02, 2024

Thinking of Downsizing Your Domain Portfolio? Don’t.

Companies may be tempted to downsize unused domains, but that would be a mistake. Our expert explains why.

Image: Shutterstock / Built In