Expert Contributors Articles

Sorted By: Most Recent
Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

An Introduction to Microsegmentation in Network Security

Microsegmentation is a popular security framework that limits vulnerability to cyberattacks and mitigates the damage attackers can do to your systems. Our expert explains how it works.

Image: Shutterstock / Built In
Andre Ferraz Andre Ferraz
Updated on April 20, 2024

How Location Fingerprinting Can Thwart Fraud

Exact location collection technology gives it an edge over traditional device fingerprinting.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is IT Security?

IT security is a series of security concepts, tools and practices that are utilized to mitigate threats and safeguard data in the face of an attack.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is IT Risk Management?

IT risk management is a process that involves identifying, monitoring and managing potential technological risks and the negative impacts upon a business, including data loss, malicious attacks, security breaches, system failures and natural disasters.

Image: Shutterstock / Built In
Brittany Allen Brittany Allen
Updated on April 20, 2024

Is AI Really Supercharging the Fraud Economy?

AI is making scams more believable than ever. Here’s what you should actually look out for.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Information Security?

Information security is a set of cybersecurity practices and processes initiated by an organization and its staff to keep data secure from unauthorized access and alteration during storage and transmission.

Image: Shutterstock / Built In
Manav Mital Manav Mital
Updated on April 20, 2024

Will Cloud Security and Database Performance Forever Be at Odds?

New approaches give hope that the never-ending tug-of-war may soon be over.

Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Identity Management?

Identity and access management (IAM) is a framework of processes, technologies and policies implemented within a business’s core structure to protect critical information and maintain control over user access to data.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

How to Neutralize Quantum Security Threats

As quantum computing accelerates, we might be facing huge threats to today’s security protocols. To find solutions, we need to act quickly.

Jack Theis Jack Theis
Updated on April 20, 2024

How Should U.S. Companies Guard Against the Growing Threat of Ransomware?

The White House has issued public guidance to help businesses establish an effective front line of defense.