Expert Contributors Articles

Sorted By: Most Recent
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Arman Sarhaddar Arman Sarhaddar
Updated on April 20, 2024

How Blockchain Can Put a Stop to Counterfeit Drugs

Pharmaceutical companies have tried to monitor their suppliers and verify the authenticity of their supply chain, but full protection has been difficult — until now.

David Koff David Koff
Updated on April 20, 2024

What a VPN Is — and Why You Should Use One

Few web tools are as poorly understood as VPNs because there’s a plethora of misinformation around their purpose and function. Understanding them better will help you to get the most out of their service.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Red Teaming: A Proactive Approach to Identifying Cyber Threats

Red teaming assesses the effectiveness of a security operations center.

Image: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

What Is Cyber Insurance? Why Do Tech Companies Need It?

Cyber insurance can cover financial losses when a company experiences a security breach.

Image: Shutterstock / Built In
David Koff David Koff
Updated on April 20, 2024

What Is Multifactor Authentication? (And Why You Should Be Using MFA Now.)

Multifactor authentication is essential for online security. Here’s how to get started with it.

Martin Kuhlmann Martin Kuhlmann
Updated on April 20, 2024

Why Strong Identity Management Matters Now More Than Ever

A rapidly evolving landscape of cyber threats amid economic instability is a recipe for attacks. Our expert explains how identity management is a strong solution.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

To Stop Future Hacks, Look to the Past

Every new technology comes with new vulnerabilities. In many cases, however, cybersecurity experts can learn from hacks of the past to close security gaps in the future.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

What Is Spear Phishing?

Spear phishing is a social engineering technique that malicious individuals use to trick targeted individuals into providing sensitive information, usually via email.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In