Expert Contributors Articles

Sorted By: Most Recent
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Red Teaming: A Proactive Approach to Identifying Cyber Threats

Red teaming assesses the effectiveness of a security operations center.

Image: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

What Is Cyber Insurance? Why Do Tech Companies Need It?

Cyber insurance can cover financial losses when a company experiences a security breach.

Image: Shutterstock / Built In
David Koff David Koff
Updated on April 20, 2024

What Is Multifactor Authentication? (And Why You Should Be Using MFA Now.)

Multifactor authentication is essential for online security. Here’s how to get started with it.

Martin Kuhlmann Martin Kuhlmann
Updated on April 20, 2024

Why Strong Identity Management Matters Now More Than Ever

A rapidly evolving landscape of cyber threats amid economic instability is a recipe for attacks. Our expert explains how identity management is a strong solution.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

To Stop Future Hacks, Look to the Past

Every new technology comes with new vulnerabilities. In many cases, however, cybersecurity experts can learn from hacks of the past to close security gaps in the future.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

What Is Spear Phishing?

Spear phishing is a social engineering technique that malicious individuals use to trick targeted individuals into providing sensitive information, usually via email.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Misha Seltzer Misha Seltzer
Updated on April 20, 2024

Security or Productivity? For Businesses Using SaaS Platforms, It’s a Balancing Act.

CISOs, you’ve got a big job on your hands. Read on to learn about the threat and how to mitigate it.

Lior Bar-Lev Lior Bar-Lev
Updated on April 20, 2024

Your CISO Should Be Integral to Your Company’s Growth Planning

As the company grows, so does its threat landscape.

David Moose Wolpoff David Moose Wolpoff
Updated on April 20, 2024

The 3 Types of CISOs You Should Know

CISOs come in three different flavors, but only one makes it more expensive for a hacker to get inside — and has the level of clout to drive institutional change.