TAP Into Technology Blog
Leading the Way in Network Technology
Gearbit Insights on IT Performance Analysis in Complex Environments
Gearbit has pioneered the “Think Like a Packet” approach to IT performance analysis – a methodology that offers tremendous advantages when hunting down the root cause of the complex issues that plague enterprise network, data center and...
Intrusion Detection 101: Rinse and Repeat
I am a long time skeptic when it comes to blacklists and other forms of signature based detection mechanisms. The information security industry has also declared the signature based anti-virus approach dead several times during the past 10...
Cyber Phishing- $46.7M Stolen from One Company
What is known as “CEO fraud” and “business email compromise” is costing companies and individuals millions. Just ask Ubiquiti Network’s Inc. who recently suffered a devasting $46,700,000.00 fraud. This is a big one, one of the biggest...
Hacktivism: Should it Really be on Your Radar in 2015?
Back in 2012, Verizon labeled 2011 as the year of the hacktivist, as 58% of all data stolen was the result of hacktivism attacks. Attention seems to have shifted to cybercrime at the enterprise level, but CISOs must stay alert to...
Why Risk Traffic Overload? Anchor Firewalls with a Network TAP
As any InfoSec professional will tell you, traffic spikes can have a big effect on the performance of key security appliances including firewalls, advanced threat detection systems, forensic data capture and more. When the applications...
Smurfing and Other Mysterious Words in the Cyber World
Cyber world has its own language, often filled with acronyms and mysterious sounding words that both the good guys and the bad guys creatively come up with to describe what's happening on the dark side of the web. If you think a Smurf...