Datamation Logo
Home
Authors
Posts by Drew Robb
thumbnail Drew Robb

Drew Robb

thumbnail 6 Top Data Science Predictions

6 Top Data Science Predictions

Big Data
December 15, 2022

The discipline of data science has come into its own since the appearance of big data more than a decade ago. Just as the universe is growing, so too does big data keep getting even bigger. In parallel, the importance of the data scientist has risen within organizations. Here are some of the top predictions […]

thumbnail 10 Top Cybersecurity Predictions for 2023

10 Top Cybersecurity Predictions for 2023

Security
December 14, 2022

We normally lay out five top predictions for the year. But with cybersecurity being such a vibrant — and sometimes frightening — field, we couldn’t keep it to five. Hence, we have 10 this year: Top Cybersecurity Predictions 1. Internet Of Things Under Attack 2. Security Cultures Emerge 3. Zero Trust Comes Of Age 4. […]

thumbnail 5 Top Security Assessment Trends

5 Top Security Assessment Trends

Security
November 21, 2022

In times such as these, there is no resting on one’s security laurels.  Encouraged by the lucrative nature of ransomware and other malware scams, cybercriminals work tirelessly to find new ways to break into IT systems. Hence, organizations must constantly assess their risk profile and find any possible weak spots before the bad actors find […]

thumbnail Top Network Segmentation Trends

Top Network Segmentation Trends

Networks
November 21, 2022

Network segmentation is a security strategy based around dividing a large network into smaller sections, each one isolated from the other.  These distinct network segments are there to limit damage during a breach. If one fails and the bad actors enter, the theory is that the remainder of the network will stand strong.  It is […]

thumbnail 5 Top Penetration Testing Trends

5 Top Penetration Testing Trends

Security
November 21, 2022

Penetration testing is based on the premise that one of the best ways to safeguard the enterprise is to pretend to be a hacker and find the number of ways you can break into a business.  The FBI uses this strategy. It often recruits criminals such as forgers and thieves who proved especially effective at […]

thumbnail 5 Top Endpoint Detection and Response (EDR) Trends

5 Top Endpoint Detection and Response (EDR) Trends

Applications
November 21, 2022

Endpoint detection and response (EDR) is such a battleground between security vendors that it has spawned a whole collection of additional terms as they seek to differentiate their wares or put a new wrapper around existing products and services. XDR and managed detection and response (MDR) are two of the most prominent. No doubt a […]

thumbnail 5 Top Unified Threat Management (UTM) Trends

5 Top Unified Threat Management (UTM) Trends

Applications
November 21, 2022

Unified threat management (UTM) is a security solution or appliance that brings together multiple security functions, such as antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering, leak prevention, and often threat intelligence.  Its popularity lies in simplicity. As there are so many different security products and services around, efforts at consolidation tend […]

thumbnail 5 Top Network Detection and Response Trends

5 Top Network Detection and Response Trends

Applications
October 26, 2022

Networks are everywhere. They encompass every phone, tablet, laptop, PC, server, router, and switch. They extend along fiber and ethernet lines as well as satellite and Wi-Fi. Increasingly, network connectivity is part of everyday objects such as cars, appliances, and other gadgets. Danger can lurk anywhere. All it takes is one piece of sloppy security […]

thumbnail 5 Top Network Access Control Trends 

5 Top Network Access Control Trends 

Applications
October 26, 2022

Network access control (NAC) technology can perhaps be regarded as the traffic cop of the enterprise. NAC systems determine who has access to the network and the many applications and data sources within it. Further, the granular controls within NAC make it possible for a user to gain access only to very specific information within […]

thumbnail 5 Top Firewall-as-a-Service (FWaaS) Trends

5 Top Firewall-as-a-Service (FWaaS) Trends

Cloud
October 26, 2022

Firewall-as-a-service (FWaaS) is a way to deliver firewall capabilities to the enterprise or small business over the cloud. It is becoming a popular choice among those that don’t want to be bogged down in the endless duties required in maintaining enterprise security.  Here are some of the top trends in firewall-as-a-service:  1. The talent crunch  […]

Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.