Drew Robb

Drew Robb has been a full-time professional writer and editor for more than twenty years. He currently works freelance for a number of IT publications, including ServerWatch and CIO Insight. He is also the editor-in-chief of an international engineering magazine.
192 Posts

18 Hot Cybersecurity Startups for 2021

The cybersecurity market is already worth more than $100 billion – and is...

Top Cybersecurity Companies

Cybersecurity is the hottest area of IT spending. That's why so many vendors have entered this lucrative $100 billion+ market. But who are the...

Best Penetration Testing Software for 2021

Penetration testing is a critical IT security practice for scanning systems, networks and...

John the Ripper: Pen Testing Product Overview and Analysis

See our complete list of top penetration testing tools.Bottom LineJohn the Ripper is...

Aircrack-ng: Pen Testing Product Overview and Analysis

See our complete list of top penetration testing tools.Bottom LineAircrack-ng is the go-to...

Wireshark: Pen Testing Product Overview and Analysis

See our complete list of top penetration testing tools.Read user reviews of Wireshark.Bottom LineWireshark is often found in the security toolkit. Pen...

Nmap: Pen Testing Product Overview and Analysis

See our complete list of top penetration testing tools.Read user reviews of Nmap.Bottom LineNmap is a port scanner more than a penetration...

Fiddler: Pen Testing Product Overview and Analysis

See our complete list of top penetration testing tools.Bottom LineFiddler is a useful collection of manual tools for dealing with web debugging,...

Nessus: Pen Testing Product Overview and Analysis

See our complete list of top penetration testing tools.Read user reviews of Nessus.Bottom LineNessus is a widely used paid vulnerability assessment tool...

Metasploit: Pen Testing Product Overview and Analysis

See our complete list of top penetration testing tools.Read user reviews of MetasploitThe...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...