TAP Into Technology Blog
Leading the Way in Network Technology
The Target Data Breach—What Two Years Can Teach Us
Can you believe that we’re coming up on the two-year anniversary of the massive 2013 Target data breach? It may not feel that way because we’re still seeing news articles pop up regarding the aftermath of the incident, but it’s true....
2015 Cyber Security Report: How the Biggest Threats and Breaches Affect Businesses Processes
Security focus has shifted from what is being taken from businesses to how attackers are gaining access to enterprise systems. Symantec notes “the number of breaches rose 23 percent” and “there was a 26 percent increase in malware” from...
Data at Risk Series: Corporate Confidentiality Cyber Attacks
While we’ve looked at the state of cyber security in the healthcare, finance and insurance industries, it doesn’t begin to cover the breadth of threats out there. Industry-agnostic attacks are constantly threatening confidential corporate...
4SICS Conference Recap on Industrial Control Systems
I attended the Swedish industrial cyber security conference 4SICS last month, where I also gave a one-day class on analyzing network traffic. 4SICS is the the leading Industrial Control System (ICS) security conference in Europe, which...
Lessons Learned from Mr. Robot: Understanding Advanced Persistent Threats
The latest breach at Scottrade makes one thing abundantly clear – cyber criminals have become more sophisticated and increasingly dangerous. With so many cyber security failures, it would be easy to assume that security appliances aren’t...
Data at Risk Series: How Is the Insurance Industry Stacking Up to Cyber Attacks?
When it comes to data privacy and cyber security, the three industries that are generally seen as the most heavily regulated are healthcare, finance and insurance. We’ve already discussed healthcare and finance, so how are insurance...