TAP Into Technology Blog
Leading the Way in Network Technology
Challenges of Defending the Internet of Things
Do you remember what you were doing on October 21, 2016? Probably not, but I can tell you what you weren’t doing. You weren’t on Twitter, Spotify, Netflix, Reddit, Tumblr, or visiting so many other major websites.
Back to the Basics: What is Network Monitoring?
Network monitoring is part of the broader function of Network management, which manages computer networks, ensuring performance management, provisioning of networks, analysis and maintaining quality of service. Network monitoring is the...
Design-IT: Reverse Bypass Mode
There have been quite a few posts about the benefits of Bypass TAPs and how they can keep the network up and running in the event an inline appliance fails. But what about situations where the inline appliance is the main source of...
Cybersecurity Threat Breakdown [MyHeritage, Coca-Cola]
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you...
A Brief History of Multi-mode Fiber; Are you ready for what’s next?
The magnitude of what we can do on any given mobile device has grown exponentially over the past few decades; our productivity is no longer dependent upon the ability to commute to work, but rather our connectivity to those we work with,...
How to Gain Full Visibility During an Instant Response Data Breach
As an instant response firm, the Cyber Defense Group focuses on two critical aspects of cyber security, the proactive side, which they call a virtual CISO, and the reactive side, which is the instant response to some sort of cyber attack.