Expert Contributors Articles

Sorted By: Most Recent
Eric Brinkman Eric Brinkman
Updated on April 20, 2024

3 Easy Ways for Cybersecurity Leaders to Improve a Business’s Security Posture

Although you may find yourself tempted to scale back on cybersecurity efforts amidst the economic downturn, our expert says now is actually the time to invest more energy to meet growing threats. Here are three effective ways to do so.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Endpoint Protection?

Endpoint protection involves security solutions that are used to address endpoint security issues.

Image: Shutterstock / Built In
Manav Mital Manav Mital
Updated on April 20, 2024

Which Data Encryption Mechanism Should You Use?

Should your data be protected at rest, in transit, or in use? A framework for developers looking to determine which encryption mechanisms will work best for their data needs.

Joshua Burnham Joshua Burnham
Updated on April 20, 2024

Cybersecurity Threats: Emerging Trends in 2022

With the year a little more than half over, we can report on what types of attacks are happening now, as well as what might be coming next.

Image: Shutterstock / Built In
David Llorens David Llorens
Updated on April 20, 2024

4 Areas to Focus on to Defeat Emerging Threats in Cloud Security

New cybersecurity threats are constantly emerging, and businesses face an unprecedented level of risk. These four areas could benefit from a different strategy to keep your organization safe.

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

How DLP Systems Improve Personnel Security

To start, they connect IT, HR and information-security teams.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Digital Forensics?

Digital forensics is the process of preservation, identification, extraction and documentation of evidence contained within a computer that can be used as evidence in a variety of contexts.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

How Deception Technology Can Thwart Cyberattacks

It warns of attacks and help uncover a malefactor’s methods and intentions.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Data Encryption?

Data encryption is a method of encoding information so it is extremely difficult to access, except by a user who possesses the correct encryption key.

Image: Shutterstock / Built In
Adam Markowitz Adam Markowitz
Updated on April 20, 2024

How Data Compliance Can Help Your Startup Close More Deals

Data compliance offers more benefits than just protecting your data. It can also give you a leg up on competitors.

Image: Shutterstock. / Built In