TAP Into Technology Blog
Leading the Way in Network Technology
Planes, Trains and Automobiles: Transportation Hacking Headaches
No, we are not going to be talking about Steve Martin’s 1987 classic, Planes, Trains & Automobiles. That movie played off of frustratingly slow transportation around the holidays, giving Martin and John Candy free reign to make us laugh...
Gearbit Insights on IT Performance Analysis in Complex Environments
Gearbit has pioneered the “Think Like a Packet” approach to IT performance analysis – a methodology that offers tremendous advantages when hunting down the root cause of the complex issues that plague enterprise network, data center and...
Intrusion Detection 101: Rinse and Repeat
I am a long time skeptic when it comes to blacklists and other forms of signature based detection mechanisms. The information security industry has also declared the signature based anti-virus approach dead several times during the past 10...
Cyber Phishing- $46.7M Stolen from One Company
What is known as “CEO fraud” and “business email compromise” is costing companies and individuals millions. Just ask Ubiquiti Network’s Inc. who recently suffered a devasting $46,700,000.00 fraud. This is a big one, one of the biggest...
Hacktivism: Should it Really be on Your Radar in 2015?
Back in 2012, Verizon labeled 2011 as the year of the hacktivist, as 58% of all data stolen was the result of hacktivism attacks. Attention seems to have shifted to cybercrime at the enterprise level, but CISOs must stay alert to...
Why Risk Traffic Overload? Anchor Firewalls with a Network TAP
As any InfoSec professional will tell you, traffic spikes can have a big effect on the performance of key security appliances including firewalls, advanced threat detection systems, forensic data capture and more. When the applications...