TAP Into Technology Blog
Leading the Way in Network Technology
Cyber Security Year in Review: Major Data Breaches of 2015
Despite innovative new cyber security appliances and applications, hackers are finding ways to push data breach statistics to new heights. Even though 2014 was deemed the year of the data breach, 2015 has shaped up to be just as...
Network Architect’s Guide to Ensuring Network Monitoring Visibility
The days of solving network problems by purchasing more bandwidth, extra storage or new servers are over. As network traffic demands increase rapidly, these traditional approaches to resolving network issues become costlier and more...
Anonymous vs. ISIS—A New Dimension of Cyber Warfare
A war is being waged in the wake of the devastating terrorist attack in Paris. But it’s not the kind of war you’ve read about and witnessed throughout your life. The President isn’t going to announce this war on television and you won’t be...
The Network Architect’s Guide to Scaling Security Programs
Security appliances have never been as important in the business world as they are now. Cyber crime is increasing at an alarming rate and CISOs at companies of all sizes are rushing to implement the latest and greatest security solutions....
The Challenges of Data Protection: Can Cyber Insurance Save You?
Major data breaches at companies of all size are telling us one thing—that businesses are struggling to deal with the challenges of data protection. Sophisticated cyber attacks are on the rise and the simple truth is that many companies...
The Target Data Breach—What Two Years Can Teach Us
Can you believe that we’re coming up on the two-year anniversary of the massive 2013 Target data breach? It may not feel that way because we’re still seeing news articles pop up regarding the aftermath of the incident, but it’s true....