TAP Into Technology Blog
Leading the Way in Network Technology
Cybersecurity Threat Breakdown [Cathay Pacific + Pentagon]
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can...
Optimize your Network Design for Intrusion Detection Systems
With today’s heightened threat levels, many companies are shoring up their defenses and adding an intrusion detection system (IDS) to their security stacks. By constantly monitoring network and system activities for malicious activity or...
How to capture and analyze all your network traffic
Since virtually all attacks cross the network, security professionals need to make fast sense of what’s actually happening with their traffic. Easier said than done, however, given the challenges associated with: Reliably and...
Network Engineer’s Guide to Reducing Mean Time to Resolution
The days of siloed IT infrastructures are quickly ending as services, applications and network components become more interdependent. IT infrastructures are becoming more complex and it’s falling on your shoulders to keep mean time to...
The 101 Series: Breakout Network TAPs
I recently wrote a blog about the six different types of network TAPs with a brief overview of each TAPs functionality. In this blog, I’m going to explain in detail more about how the breakout or commonly referred to tap mode operates....
Ensure Digital Integrity to Comply with GDPR
General Data Protection Regulation (GDPR) is a mandated regulatory standard designed to unify data privacy and security requirements. This regulation affects companies that provide services within the European Union; however, any company...