Drew Robb

Drew Robb has been a full-time professional writer and editor for more than twenty years. He currently works freelance for a number of IT publications, including eSecurity Planet and CIO Insight. He is also the editor-in-chief of an international engineering magazine.

10 Top Cybersecurity Predictions for 2023

We normally lay out five top predictions for the year. But with cybersecurity being such a vibrant — and sometimes frightening — field, we couldn’t keep it to five. Hence, we have 10...

5 Top Security Assessment Trends

In times such as these, there is no resting on one’s security laurels.  Encouraged by the lucrative nature of ransomware and other malware scams, cybercriminals work tirelessly to find new ways to break...

Top Network Segmentation Trends

Network segmentation is a security strategy based around dividing a large network into smaller sections, each one isolated from the other.  These distinct network segments are there to limit damage during a breach....

5 Top Penetration Testing Trends

Penetration testing is based on the premise that one of the best ways to safeguard the enterprise is to pretend to be a hacker and find the number of ways you can...

5 Top Data Classification Trends

Data classification deals with the various processes used to understand information assets.  It incorporates techniques such as assigning a value to those assets, tagging them in different ways, and determining the effort and...

5 Top Endpoint Detection and Response (EDR) Trends

Endpoint detection and response (EDR) is such a battleground between security vendors that it has spawned a whole collection of additional terms as they seek to differentiate their wares or put a...

5 Top Unified Threat Management (UTM) Trends

Unified threat management (UTM) is a security solution or appliance that brings together multiple security functions, such as antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering, leak prevention, and...

5 Top Network Detection and Response Trends

Networks are everywhere. They encompass every phone, tablet, laptop, PC, server, router, and switch. They extend along fiber and ethernet lines as well as satellite and Wi-Fi. Increasingly, network connectivity is part...

5 Top Network Access Control Trends 

Network access control (NAC) technology can perhaps be regarded as the traffic cop of the enterprise. NAC systems determine who has access to the network and the many applications and data sources...

5 Top Firewall-as-a-Service (FWaaS) Trends

Firewall-as-a-service (FWaaS) is a way to deliver firewall capabilities to the enterprise or small business over the cloud. It is becoming a popular choice among those that don’t want to be bogged...

5 Top Next-Generation Firewall Trends 

A next-generation firewall (NGFW) is a networking and security appliance or application that processes network traffic. NGFWs apply rules to block dangerous or potentially dangerous traffic. They rose to prominence about five years ago...

5 Top Firewall Trends

Firewalls have come a long way since they first appeared in the late 1980’s. Back at that time, they did little more than basic packet-filtering duties, monitoring the packets being sent between...

Latest Articles