TAP Into Technology Blog
Leading the Way in Network Technology
Why OT Security Relies on Threat Detection and Response
As the names imply, operational technology (OT) and information technology (IT) have different origins. OT exists to manage operations – specifically, physical operations in various sectors of industry that have benefited from automation...
How Healthcare Providers Can Fight Back Against Cyber Attacks
When it comes to industries that are under threat from cyberattacks, healthcare ranks near the top. Although attackers love to steal banking and payment information, data stolen from healthcare organizations can be up to fifty times more...
MSP Hacks like REvil Highlight Need for Secure Visibility
For some companies, managed services providers (MSPs) can be a godsend—a force multiplier that allows them to support more customers and more employees without the effort and expense of expanding their IT department. MSPs are vendors with...
Breathe New Life Into Your Existing Packet Broker
If you have been in networking long enough, you may have heard the phrase “breathe new life into old tools.” This concept is simple - security and monitoring tools only perform as well as the data they process. So solely relying on SPAN...
How to Solve Legacy OT Security Challenges
In the course of everyday life, many of the decisions we make about information technology (IT) in a business context are simpler than they may seem at first glance. If we’re buying mobile phones or tablets to help employees stay in touch...
Ensuring Success of New Federal Zero Trust Initiatives
With high-profile cyber attacks on federal assets and critical infrastructure on the rise, the US Federal Government has shifted to a proactive posture in confronting these threats. The Department of Homeland Security’s Transportation...