Expert Contributors Articles

Sorted By: Most Recent
Ralph Rodriguez Ralph Rodriguez
Updated on April 20, 2024

Welcome to the Era of the Zero-Trust Consumer

Zero-trust architecture, in which everything is treated as a potential threat, is becoming the norm in industry. Our expert suggests it’s time to make the consumer a part of that framework.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Zero Trust: What It Is and Important Aspects of It

Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Arman Sarhaddar Arman Sarhaddar
Updated on April 20, 2024

How Blockchain Can Put a Stop to Counterfeit Drugs

Pharmaceutical companies have tried to monitor their suppliers and verify the authenticity of their supply chain, but full protection has been difficult — until now.

David Koff David Koff
Updated on April 20, 2024

What a VPN Is — and Why You Should Use One

Few web tools are as poorly understood as VPNs because there’s a plethora of misinformation around their purpose and function. Understanding them better will help you to get the most out of their service.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Red Teaming: A Proactive Approach to Identifying Cyber Threats

Red teaming assesses the effectiveness of a security operations center.

Image: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

What Is Cyber Insurance? Why Do Tech Companies Need It?

Cyber insurance can cover financial losses when a company experiences a security breach.

Image: Shutterstock / Built In
David Koff David Koff
Updated on April 20, 2024

What Is Multifactor Authentication? (And Why You Should Be Using MFA Now.)

Multifactor authentication is essential for online security. Here’s how to get started with it.

Martin Kuhlmann Martin Kuhlmann
Updated on April 20, 2024

Why Strong Identity Management Matters Now More Than Ever

A rapidly evolving landscape of cyber threats amid economic instability is a recipe for attacks. Our expert explains how identity management is a strong solution.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

To Stop Future Hacks, Look to the Past

Every new technology comes with new vulnerabilities. In many cases, however, cybersecurity experts can learn from hacks of the past to close security gaps in the future.