TAP Into Technology Blog
Leading the Way in Network Technology
The Buffering Bluff on Aggregation TAPs
In a world of shrinking IT budgets, many are turning to network aggregating TAPs to reduce costs within their security and network monitoring programs. Because aggregating TAPs integrate multiple traffic flows into a single stream, IT can...
Fake News Is More than Just Misinformation—What to Do About Malvertising
There’s a reason why companies have so much trouble keeping up with cyber attackers. Every time you think your new security appliance is the perfect defense, attackers change things up to stay one step ahead. And now, the bad guys are...
Detecting Fake SSL Sessions as Part of C&C Activity
One of the best ways to learn how to protect against malware is to learn how to detect malware traffic. Towards this end, we are constantly searching the Internet for as many types of malware pcaps as we can find. This blog focuses on the...
Follow the History and Added Function of the Network TAP
The two most common methods to access network data are via a Network TAP or from a SPAN port. How much do you know about Network TAPs? If you don't use them, maybe you think it's just another failure point or there may be a forwarding...
[Demo] Chaining the Edge of your Network
In our recent webinar with Palo Alto Networks' Fuel User Group I asked the attendees a survey question: "How many security tools do you currently deploy?" The answer from the majority of the group was "4 or more." The attendees - all Fuel...
Inside Splunk, a New SIEM Solution for MSSPs
Splunk. The name is not very descriptive, but if you drop it in front of IT professional, they’ll know what you mean. This cloud-based platform for operational intelligence is a new and sophisticated big data tool, which gives even novice...