Expert Contributors Articles

Sorted By: Most Recent
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Information Security?

Information security is a set of cybersecurity practices and processes initiated by an organization and its staff to keep data secure from unauthorized access and alteration during storage and transmission.

Image: Shutterstock / Built In
Manav Mital Manav Mital
Updated on April 20, 2024

Will Cloud Security and Database Performance Forever Be at Odds?

New approaches give hope that the never-ending tug-of-war may soon be over.

Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Identity Management?

Identity and access management (IAM) is a framework of processes, technologies and policies implemented within a business’s core structure to protect critical information and maintain control over user access to data.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

How to Neutralize Quantum Security Threats

As quantum computing accelerates, we might be facing huge threats to today’s security protocols. To find solutions, we need to act quickly.

Jack Theis Jack Theis
Updated on April 20, 2024

How Should U.S. Companies Guard Against the Growing Threat of Ransomware?

The White House has issued public guidance to help businesses establish an effective front line of defense.

Brittany Allen Brittany Allen
Updated on April 20, 2024

I Go on the Dark Web So You Don’t Have To

Fraud is an ever-growing and evolving challenge. By going undercover, we can understand how.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

Cybersecurity Threats Are Worse Than Ever — Here’s How We Stop Them

Hackers are creating new malware every day, and cybersecurity companies are having a hard time keeping up. But there are steps we can take to protect ourselves and our businesses.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

5 Ways to Combat Alert Fatigue in Your Security Program

Alerts are an important part of an effective cybersecurity program, but too many of them lead to a “boy who cried wolf” mindset. Use these strategies to prioritize the most important ones and avoid alert fatigue.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Ethical Hacking?

Ethical hacking is an offensive-focused security investigation used to identify and exploit cybersecurity vulnerabilities within an IT environment.

Image: Shutterstock / Built In
Spandan Mahapatra Spandan Mahapatra
Updated on April 20, 2024

Enterprise Phishing Attacks Are on the Rise. Are Your Employees Security Threats?

In their emphasis on network infrastructure and data protection, companies often overlook another major threat: user error.