TAP Into Technology Blog
Leading the Way in Network Technology
MSP Hacks like REvil Highlight Need for Secure Visibility
For some companies, managed services providers (MSPs) can be a godsend—a force multiplier that allows them to support more customers and more employees without the effort and expense of expanding their IT department. MSPs are vendors with...
Breathe New Life Into Your Existing Packet Broker
If you have been in networking long enough, you may have heard the phrase “breathe new life into old tools.” This concept is simple - security and monitoring tools only perform as well as the data they process. So solely relying on SPAN...
How to Solve Legacy OT Security Challenges
In the course of everyday life, many of the decisions we make about information technology (IT) in a business context are simpler than they may seem at first glance. If we’re buying mobile phones or tablets to help employees stay in touch...
Ensuring Success of New Federal Zero Trust Initiatives
With high-profile cyber attacks on federal assets and critical infrastructure on the rise, the US Federal Government has shifted to a proactive posture in confronting these threats. The Department of Homeland Security’s Transportation...
Closing the Visibility Gap for Financial Cybersecurity Threats
Financial institutions are a storehouse of attractive data for attackers. Although most attacks against financial organizations don’t necessarily succeed in emptying coffers outright, other information—such as PII (Personally identifiable...
MITRE ATT&CK: The Magic of Segmentation
In cybersecurity, nation-states, cybercriminals, hacktivists, and rogue employees are the usual suspects. They fit nicely into categories like external attackers or insider threats. But what about our essential suppliers, partners, and...