Sarah Bricker Hunt covers wide-ranging topics for various audiences, including tech-focused features on data privacy, telecom, corporate and consumer technology trends, and more. Hunt's work is frequently featured in print publications, B2B and B2C trade journals, and numerous high-profile websites.
10 articles written
0 comments made
Kubernetes Storage enables persistent, stateful data retention within cluster deployments. Explore how Kubernetes Works. Click here now.
PCIe Solid State Drives connect to computers using a PCIe interface, offering faster speeds and other benefits.
Vulnerability scanning is integral to identifying areas of risk in your network. Here are 5 companies that use third-party scanning tools.
Circuit-level gateways provide protection at the session layer to ensure trustworthy TCP connections.
Application level gateways filter network application data being sent across protocols like FTP.
Host-based firewalls protect individual devices and can be used alongside network-based firewalls. Learn how they work and find providers.
Packet-filtering firewalls restrict traffic to and from networks. Learn how they work and what you should know before buying.
A quality enterprise firewall should be a top priority for businesses building a secure infrastructure. These tools protect endpoints...