Expert Contributors Articles

Sorted By: Most Recent
Brittany Allen Brittany Allen
Updated on April 20, 2024

Is AI Really Supercharging the Fraud Economy?

AI is making scams more believable than ever. Here’s what you should actually look out for.

Image: Shutterstock / Built In
Manav Mital Manav Mital
Updated on April 20, 2024

Will Cloud Security and Database Performance Forever Be at Odds?

New approaches give hope that the never-ending tug-of-war may soon be over.

Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

How to Neutralize Quantum Security Threats

As quantum computing accelerates, we might be facing huge threats to today’s security protocols. To find solutions, we need to act quickly.

Jack Theis Jack Theis
Updated on April 20, 2024

How Should U.S. Companies Guard Against the Growing Threat of Ransomware?

The White House has issued public guidance to help businesses establish an effective front line of defense.

Brittany Allen Brittany Allen
Updated on April 20, 2024

I Go on the Dark Web So You Don’t Have To

Fraud is an ever-growing and evolving challenge. By going undercover, we can understand how.

Image: Shutterstock / Built In
Ari Joury, Ph.D. Ari Joury, Ph.D.
Updated on April 20, 2024

Cybersecurity Threats Are Worse Than Ever — Here’s How We Stop Them

Hackers are creating new malware every day, and cybersecurity companies are having a hard time keeping up. But there are steps we can take to protect ourselves and our businesses.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

5 Ways to Combat Alert Fatigue in Your Security Program

Alerts are an important part of an effective cybersecurity program, but too many of them lead to a “boy who cried wolf” mindset. Use these strategies to prioritize the most important ones and avoid alert fatigue.

Image: Shutterstock / Built In
Spandan Mahapatra Spandan Mahapatra
Updated on April 20, 2024

Enterprise Phishing Attacks Are on the Rise. Are Your Employees Security Threats?

In their emphasis on network infrastructure and data protection, companies often overlook another major threat: user error.

Eric Brinkman Eric Brinkman
Updated on April 20, 2024

3 Easy Ways for Cybersecurity Leaders to Improve a Business’s Security Posture

Although you may find yourself tempted to scale back on cybersecurity efforts amidst the economic downturn, our expert says now is actually the time to invest more energy to meet growing threats. Here are three effective ways to do so.

Image: Shutterstock / Built In
Anthony Corbo Anthony Corbo
Updated on April 20, 2024

What Is Endpoint Protection?

Endpoint protection involves security solutions that are used to address endpoint security issues.

Image: Shutterstock / Built In