Chris Bihary
Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.
[Recorded Webinar]: The In’s and Out’s of Internal and External Network TAPs
Join Garland Technology, a founding Partner of the Fuel User Group and Fuel’s new Networking & Connectivity special interest group for a recorded webinar to better understand the In’s and Out’s of Internal and External Network TAPs. This...
Data at Risk Series: Diving Into the Finance Industry Cyber Security Threats
Hacking used to be a small-time hobby often used for pranks. Now, hackers aren’t just hackers anymore. Today they’re sophisticated cyber criminals going where the money leads them – to the financial organizations that manage it. As cyber...
Planes, Trains and Automobiles: Transportation Hacking Headaches
No, we are not going to be talking about Steve Martin’s 1987 classic, Planes, Trains & Automobiles. That movie played off of frustratingly slow transportation around the holidays, giving Martin and John Candy free reign to make us laugh...
Hacktivism: Should it Really be on Your Radar in 2015?
Back in 2012, Verizon labeled 2011 as the year of the hacktivist, as 58% of all data stolen was the result of hacktivism attacks. Attention seems to have shifted to cybercrime at the enterprise level, but CISOs must stay alert to...
Why Risk Traffic Overload? Anchor Firewalls with a Network TAP
As any InfoSec professional will tell you, traffic spikes can have a big effect on the performance of key security appliances including firewalls, advanced threat detection systems, forensic data capture and more. When the applications...
The Visibility Test: How to Give Security Devices a 360 View of Network Traffic
Complete network visibility is no longer a "nice to have" technology feature for security appliances such as firewalls, intrusion detection systems or forensic analyzers – it’s a “must have” requirement. Any security engineer that doesn’t...