Sarah Hunt

Sarah Bricker Hunt covers wide-ranging topics for various audiences, including tech-focused features on data privacy, telecom, corporate and consumer technology trends, and more. Hunt's work is frequently featured in print publications, B2B and B2C trade journals, and numerous high-profile websites.

EDR vs. NDR vs. XDR: Which Should You Use?

Endpoint detection and response (EDR), network detection and response (NDR), and extended detection and response (XDR) are closely related categories of threat detection technology. Each of these tools can detect and respond...

Firewall Placement: Where Firewalls Sit on a Network

At a high level, firewalls are positioned to create a protective barrier between external, potentially dangerous traffic sources and internal networks as well as within the enterprise perimeter, between segmented parts of...

How to Perform a Vulnerability Scan: 4 Steps

Network vulnerability scanning is the process of pinpointing weaknesses and vulnerabilities across a network, including evaluating network assets like computers and other devices — any potential target that could be exploited by threat...

How to Perform a Firewall Audit: 6 Steps

A firewall audit is a multistep process that gives organizations insight into the status and effectiveness of the firewalls installed throughout their network. These audits provide visibility into potential vulnerabilities and the...

5 Types of Firewalls: Differences Explained & When to Use Each

Firewalls are network security devices that monitor and filter traffic as it flows to, from, and across networks based on a given enterprise’s pre-established security policies. Ideally, firewalls block dangerous traffic and...

What is Network Detection and Response (NDR)? Ultimate Guide

Network detection and response, or NDR, is a cybersecurity tool that continuously scans traffic for potential risks by using machine learning and artificial intelligence (AI). When risks are encountered, NDR systems initiate...

What Is Managed Detection and Response (MDR)? Ultimate Guide

Managed detection and response (MDR) adds an additional layer of protection and elevates the security postures of organizations relying on legacy solutions. Managed detection and response is becoming more popular as organizations look...

How Network Detection & Response (NDR) Works

Network Detection and Response (NDR) is a network security approach that identifies and stops network threats that have gone otherwise undetected by traditional network gatekeeping tools. NDR is sometimes called Network Traffic...

5 Internet of Things (IoT) Edge Computing Trends

Internet of Things (IoT) edge computing trends reflect the recent increase in the adoption of both edge computing and IoT among enterprises and individual consumers.  Gartner predicts that 75% of enterprise-generated data will...

5 Internet of Things (IoT) Sensor Trends

Internet of Things (IoT) sensor trends reflect a rapidly expanding IoT market. Emergen Research reports that the global sensors in the IoT devices market will reach a market size of $205 billion in...

The Internet of Things (IoT) Sensor Market

Alongside the burgeoning Internet of Things (IoT) software market, the IoT sensor market is experiencing rapid growth. Organizations and individuals are using IoT sensors to gather, send, and analyze data about everything...

Internet of Things (IoT) Software Trends

Internet of Things (IoT) software trends include a focus on cybersecurity and all-in-one desktop interfaces that help organizations manage IoT device endpoints and the data these devices collect.  IoT software today The IoT software...

Latest Articles