Cybersecurity + IT Articles

Sorted By: Most Recent
Aimei Wei Aimei Wei
Updated on December 20, 2023

Why You Should Adopt Open XDR into Your Cybersecurity Strategy

It’s not enough just to have lots of strong tools anymore.

Image: Shutterstock / Built In
James Stanger James Stanger
Updated on December 19, 2023

How to Reduce Technical Debt and Bolster Your Cybersecurity

Failing to integrate IT best practices and team members into technical decisions can lead to ransomware attacks, data breaches and more. Here’s how to fix it.

Image: Shutterstock / Built In
Kapil Tandon Kapil Tandon
Updated on November 01, 2023

Are Your Generative AI Tools Doing More Harm Than Good?

Generative AI promises greater efficiency, but without a plan, it could end up being a high-powered spam machine creating more work. Here’s how.

Image: Shutterstock / Built In
Nitin Garg Nitin Garg
Updated on October 19, 2023

3 Ways AI Will Change the Workplace in 2024

With AI becoming commonplace, what does the near future of work look like?

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on September 27, 2023

What Is a CDN?

Chances are you interact with CDNs (content delivery networks) on a daily basis, but what exactly is a CDN and how does it work? Our expert explains.

Image: Shutterstock / Built In
Tamas Kadar Tamas Kadar
Updated on September 27, 2023

AI-Driven Fraud Is on the Rise. Here’s How to Combat It.

AI is being used to create fake identities, send convincing phishing emails and even clone voices to steal user data and money. Fighting it starts with awareness.  

Image: Shutterstock / Built In
Nikita Fedorov Nikita Fedorov
Updated on May 03, 2023

4 Tips to Improve Efficiency for Remote Developers

Remote work is here to stay in the IT world, so make sure you set your software developers up for success by following these principles.

Image: Shutterstock / Built In
Estefanía García Gallardo Estefanía García Gallardo
Updated on March 28, 2023

What Is File Transfer Protocol (FTP)?

File transfer protocol has been around for many years and is largely used to share files over the internet. Here’s how it works and why we still use it.

Image: Shutterstock / Built In
Bailey Reiners Bailey Reiners
Updated on March 15, 2023

Cyber Security Recruitment: What You Need To Know

Take a deep dive into the data behind Cyber Security recruiting.

Lisa Bertagnoli Lisa Bertagnoli
Updated on March 15, 2023

Need Tech Talent? Look Beyond Computer Science Degrees.

Apprentices and nontraditional candidates add a fresh perspective to tech teams, plus help with diversity and recruiting.