TAP Into Technology Blog
Leading the Way in Network Technology
Restaurants Taking Measure to Guard Against Hacks
It’s just another night out with family and friends as you stop and have a bite to eat at your favorite local restaurant. Everything seems normal as the waitress comes over and hands you the bill. But this restaurant has adopted the new...
7 Challenges for Industrial Internet of Things (IIoT) Adopters
Businesses are in a constant battle to balance the benefits of new technology with the risks of increasingly sophisticated data breaches. But things are a bit different for those responsible for critical infrastructure. The pressure to...
[Demo] Deploying an Active, In-line Security Tool
In our recent Fuel User Group Webinar, Protecting the Core, we gave a demonstration on the ease of deployment and benefits of using a bypass network TAP with an active, inline device. With a click of a mouse, you can very simply bypass the...
Ways to Protect Against Phishing
Just like the internet, phishing has evolved more and more over the years. Of the more than 537,000 phishing threats that were reported in the 2017 Global Spear Phishing Report, 91 percent (490,557) contained characteristics of display...
Filtering + Aggregation = Never Oversubscribe Again
For network IT managers that send data to monitoring tools, the concern about oversubscribed ports is a continual battle. You can’t always predict your network traffic, and as you probably know - problems arise at the worst times possible....
Beware Industrial Internet of Things (IIoT) Attacks—The Dark Side of Connectivity
Just as you start getting used to the idea of shifting from serial communications to Industrial Ethernet connectivity, operational technology demands are changing yet again. For utility companies trying to get more agile and flexible...