TAP Into Technology Blog
Leading the Way in Network Technology
How does asset discovery work in OT environments?
Imagine the following scenario. You’re the CEO of an independent crude oil pipeline operator serving a dozen fields in the Permian Basin, and the recent ransomware attack on Colonial Pipeline has got you thinking. So far, your company has...
Building Trust After Supply Chain Attacks
If you’re in charge of defending the average enterprise, your supply chain might be your least-defended attack surface. In the language of information security, your supply chain is any vendor or service provider with a password, and...
Best Practices for Healthcare IoT Security Monitoring
2020 was a watershed year for IoT; for the first time ever, IoT connections like connected industrial equipment and home devices outnumbered non-IoT connections (smartphones, laptops, and desktop computers). And while analysts have...
Network Packet Brokers: Tunneling Explained
We’ve discussed why network packet brokers are an essential component for the increasingly crowded data center, for traffic aggregation and load balancing. We’ve also begun diving into specific advanced features such as deduplication....
Colonial Pipeline Hack Sounds Alarm for Greater OT Security
It’s been less than a week since Colonial Pipeline, the Georgia-based operator of a petroleum product pipeline network that runs across 13 states from Texas to New Jersey, revealed that it had been hit with a ransomware attack. The attack...
Virtual power plants exist and yes, visibility is important
Globally, a consensus seems to be emerging that the time has come to push forward with the switch from fossil fuels to renewable energy. This is good news for climate scientists, environmental activists, and everyone else concerned about...