Expert Contributors Articles

Sorted By: Most Recent
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Cryptography?

Cryptography is the study of secure communication methods that enable only the sender and the intended recipient to view a message’s content.

Image: Shutterstock / Built In
Andrew Gitt Andrew Gitt
Updated on April 20, 2024

What to Consider When Choosing a Corporate VPN for Remote Workers

Providing access to company data from remote locations presents a host of security vulnerabilities. Here’s how to protect yourself.

Aner Gelman Aner Gelman
Updated on April 20, 2024

The Next Big Cybersecurity Threat Is Connected SaaS Platforms

What to do to keep your company safe.

David Balaban David Balaban
Updated on April 20, 2024

6 WordPress Plugin Vulnerabilities Breached by Hackers

A look at popular plugins that have fallen prey to malicious actors, and ways to protect yourself from future attacks.

David Koff David Koff
Updated on April 20, 2024

4 Methods and Tools for Enhanced Privacy in a Digital Age

Chances are, you should protect your personal information more than you currently do. Use these tools to enhance your security and guard your privacy.

Jon Lucas Jon Lucas
Updated on April 20, 2024

3 Things to Consider Before Choosing a Disaster Recovery Solution

With disasters and attacks on the rise, back-up solutions should be core to any digital transformation strategy.

Neil Daswani and Moudy Elbayadi Neil Daswani and Moudy Elbayadi
Updated on April 20, 2024

3 Pragmatic Root Causes of Data Breaches

At the highest level, cybersecurity breaches are the result of one of three problems: lack or prioritization, lack of investment or poor execution of security procedures.

Eitan Worcel Eitan Worcel
Updated on April 20, 2024

Can AI Solve the Growing Cybersecurity Shortage?

Despite record numbers of cybersecurity professionals, the workforce can’t expand fast enough to meet the field’s needs. It’s time the industry embraces AI to close the gap.   

Image: Shutterstock / Built In
Frank Smith Frank Smith
Updated on April 20, 2024

How to Protect Your Business From Employee Device Risks

Phishing attacks have increased sevenfold since last year, and 30 percent of companies don’t have a BYOD policy at all. It’s a catastrophe waiting to happen.

Alan Duric Alan Duric
Updated on April 20, 2024

3 Ways to Build Trust Into Technology

Trust is easily lost and hard to regain. Ignoring these cybersecurity initiatives until it is too late could devastate your business.