TAP Into Technology Blog
Leading the Way in Network Technology
TAP Toons: In a Network Far, Far Away
In the latest TAP Toons, our Sr. Engineer get's the shock of his life when the Network Newbie takes his Star Wars obsession to the next level.
The Buffering Bluff on Aggregation TAPs
In a world of shrinking IT budgets, many are turning to network aggregating TAPs to reduce costs within their security and network monitoring programs. Because aggregating TAPs integrate multiple traffic flows into a single stream, IT can...
Fake News Is More than Just Misinformation—What to Do About Malvertising
There’s a reason why companies have so much trouble keeping up with cyber attackers. Every time you think your new security appliance is the perfect defense, attackers change things up to stay one step ahead. And now, the bad guys are...
Detecting Fake SSL Sessions as Part of C&C Activity
One of the best ways to learn how to protect against malware is to learn how to detect malware traffic. Towards this end, we are constantly searching the Internet for as many types of malware pcaps as we can find. This blog focuses on the...
Follow the History and Added Function of the Network TAP
The two most common methods to access network data are via a Network TAP or from a SPAN port. How much do you know about Network TAPs? If you don't use them, maybe you think it's just another failure point or there may be a forwarding...
[Demo] Chaining the Edge of your Network
In our recent webinar with Palo Alto Networks' Fuel User Group I asked the attendees a survey question: "How many security tools do you currently deploy?" The answer from the majority of the group was "4 or more." The attendees - all Fuel...