Operations Articles

Sorted By: Most Recent
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Red Teaming: A Proactive Approach to Identifying Cyber Threats

Red teaming assesses the effectiveness of a security operations center.

Image: Shutterstock / Built In
Amir Tarighat Amir Tarighat
Updated on April 20, 2024

What Is Cyber Insurance? Why Do Tech Companies Need It?

Cyber insurance can cover financial losses when a company experiences a security breach.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Misha Seltzer Misha Seltzer
Updated on April 20, 2024

Security or Productivity? For Businesses Using SaaS Platforms, It’s a Balancing Act.

CISOs, you’ve got a big job on your hands. Read on to learn about the threat and how to mitigate it.

Lior Bar-Lev Lior Bar-Lev
Updated on April 20, 2024

Your CISO Should Be Integral to Your Company’s Growth Planning

As the company grows, so does its threat landscape.

David Moose Wolpoff David Moose Wolpoff
Updated on April 20, 2024

The 3 Types of CISOs You Should Know

CISOs come in three different flavors, but only one makes it more expensive for a hacker to get inside — and has the level of clout to drive institutional change.

Updated on April 20, 2024

The Real Cost of Ransomware, and What Can Be Done About It

Data breaches keep getting bigger and more costly. How should an organization face this growing threat?

David Balaban David Balaban
Updated on April 20, 2024

Here’s What You Should Consider When Choosing a DLP System

These questions will help you determine whether a data loss prevention system will fit your needs.

Nancy Wang Nancy Wang
Updated on April 20, 2024

Evolve Your IT Strategy to Defend Against Ransomware Attacks

Protect your business assets by incorporating the PIDR data protection framework Nancy Wang uses in her work as a general manager at Amazon Web Services.

Related Topics