Expert Contributors Articles

Sorted By: Most Recent
David Balaban David Balaban
Updated on April 20, 2024

Here’s What You Should Consider When Choosing a DLP System

These questions will help you determine whether a data loss prevention system will fit your needs.

Jacob Sever Jacob Sever
Updated on April 20, 2024

5 Efficient Ways to Prevent Fraud in Fintech

By blending multiple new technologies, you can maximize your security — and protect your customers.

Apu Pavithran Apu Pavithran
Updated on April 20, 2024

The Days of Passwords Are Numbered. Is Your Business Ready?

Passwords are no longer up to the task of protecting sophisticated systems from cybercriminal intrusion. Our expert offers guidance on getting ready for what’s coming next.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

When and How to Run a Phishing Simulation

An uptick in cybersecurity events might mean your employees need help in recognizing phishing scams.

Image: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Image: Shutterstock / Built In
Joshua Burnham Joshua Burnham
Updated on April 20, 2024

How the Cybersecurity Industry Is Evolving

In honor of cybersecurity awareness month, here are some new industry trends to keep an eye on.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

An Introduction to Microsegmentation in Network Security

Microsegmentation is a popular security framework that limits vulnerability to cyberattacks and mitigates the damage attackers can do to your systems. Our expert explains how it works.

Image: Shutterstock / Built In
Andre Ferraz Andre Ferraz
Updated on April 20, 2024

How Location Fingerprinting Can Thwart Fraud

Exact location collection technology gives it an edge over traditional device fingerprinting.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is IT Risk Management?

IT risk management is a process that involves identifying, monitoring and managing potential technological risks and the negative impacts upon a business, including data loss, malicious attacks, security breaches, system failures and natural disasters.

Image: Shutterstock / Built In
Brittany Allen Brittany Allen
Updated on April 20, 2024

Is AI Really Supercharging the Fraud Economy?

AI is making scams more believable than ever. Here’s what you should actually look out for.

Image: Shutterstock / Built In