Expert Contributors Articles

Sorted By: Most Recent
Apu Pavithran Apu Pavithran
Updated on April 20, 2024

The Days of Passwords Are Numbered. Is Your Business Ready?

Passwords are no longer up to the task of protecting sophisticated systems from cybercriminal intrusion. Our expert offers guidance on getting ready for what’s coming next.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

When and How to Run a Phishing Simulation

An uptick in cybersecurity events might mean your employees need help in recognizing phishing scams.

Image: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Joshua Burnham Joshua Burnham
Updated on April 20, 2024

How the Cybersecurity Industry Is Evolving

In honor of cybersecurity awareness month, here are some new industry trends to keep an eye on.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Network Security?

Network security describes a combination of technologies, devices, processes and policies used to protect the confidentiality, integrity and availability of networks and data.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

An Introduction to Microsegmentation in Network Security

Microsegmentation is a popular security framework that limits vulnerability to cyberattacks and mitigates the damage attackers can do to your systems. Our expert explains how it works.

Image: Shutterstock / Built In
Andre Ferraz Andre Ferraz
Updated on April 20, 2024

How Location Fingerprinting Can Thwart Fraud

Exact location collection technology gives it an edge over traditional device fingerprinting.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is IT Security?

IT security is a series of security concepts, tools and practices that are utilized to mitigate threats and safeguard data in the face of an attack.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is IT Risk Management?

IT risk management is a process that involves identifying, monitoring and managing potential technological risks and the negative impacts upon a business, including data loss, malicious attacks, security breaches, system failures and natural disasters.

Image: Shutterstock / Built In
Brittany Allen Brittany Allen
Updated on April 20, 2024

Is AI Really Supercharging the Fraud Economy?

AI is making scams more believable than ever. Here’s what you should actually look out for.

Image: Shutterstock / Built In