Thursday, December 1, 2022

Drew Robb

Drew Robb has been a full-time professional writer and editor for more than twenty years. He currently works freelance for a number of IT publications, including eSecurity Planet and CIO Insight. He is also the editor-in-chief of an international engineering magazine.

5 Top Security Assessment Trends in 2022

In times such as these, there is no resting on one’s security laurels.  Encouraged by the lucrative nature of ransomware and other malware scams, cybercriminals work tirelessly to find new ways to break...

Top Network Segmentation Trends in 2022

Network segmentation is a security strategy based around dividing a large network into smaller sections, each one isolated from the other.  These distinct network segments are there to limit damage during a breach....

5 Top Penetration Testing Trends in 2022

Penetration testing is based on the premise that one of the best ways to safeguard the enterprise is to pretend to be a hacker and find the number of ways you can...

5 Top Data Classification Trends in 2022

Data classification deals with the various processes used to understand information assets.  It incorporates techniques such as assigning a value to those assets, tagging them in different ways, and determining the effort and...

5 Top Endpoint Detection and Response (EDR) Trends in 2022

Endpoint detection and response (EDR) is such a battleground between security vendors that it has spawned a whole collection of additional terms as they seek to differentiate their wares or put a...

5 Top Unified Threat Management (UTM) Trends in 2022

Unified threat management (UTM) is a security solution or appliance that brings together multiple security functions, such as antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering, leak prevention, and...

5 Top Vulnerability Scanning Trends in 2022

As the saying goes, there is no rest for the wicked … or for vulnerability scanners. The volume of threats is so high that organizations must constantly be on their guard. This...

5 Top Network Detection and Response Trends in 2022

Networks are everywhere. They encompass every phone, tablet, laptop, PC, server, router, and switch. They extend along fiber and ethernet lines as well as satellite and Wi-Fi. Increasingly, network connectivity is part...

5 Top Network Access Control Trends in 2022 

Network access control (NAC) technology can perhaps be regarded as the traffic cop of the enterprise. NAC systems determine who has access to the network and the many applications and data sources...

5 Top Firewall-as-a-Service (FWaaS) Trends in 2022

Firewall-as-a-service (FWaaS) is a way to deliver firewall capabilities to the enterprise or small business over the cloud. It is becoming a popular choice among those that don’t want to be bogged...

5 Top Next-Generation Firewall Trends in 2022 

A next-generation firewall (NGFW) is a networking and security appliance or application that processes network traffic. NGFWs apply rules to block dangerous or potentially dangerous traffic. They rose to prominence about five years ago...

5 Top Firewall Trends in 2022

Firewalls have come a long way since they first appeared in the late 1980’s. Back at that time, they did little more than basic packet-filtering duties, monitoring the packets being sent between...

Latest Articles