TAP Into Technology Blog
Leading the Way in Network Technology
Chinese Cyber Attacks – For Economic Gain or Cyber Invasion
In December of 2010, long before news broke regarding the Chinese attacks on US critical infrastructure, I got a call from a utility customer that quite simply said, “We’ve been hacked and I don’t know how bad. Can you help?” I was on a...
Flawed Intrusion Detection = A 46% Gash In Your Profits
When you've invested heavily in a new intrusion detection or prevention system, you expect that it’s going to protect your clients and your entire network. But, the success of your system isn’t solely dependent on the appliance itself....
Edge Devices Perform More Tasks Than Any Other Layer
Your edge devices play a critical role in your network management. While the muscle (or core) of your network does the heavy lifting – forwarding packets of data to other network layers – the edge houses crucial functions such as network...
Protect Against Bleeding Data At Your Network Edge
The edge of your network is where the battle over your network security takes place. These functions are far more intelligent than that which occurs within your network core.
Implement Data Loss Prevention To Run A Safer Business
Network security and data loss prevention have become increasingly important in running your business. Unfortunately, though, it’s also been more difficult to prevent hackers from accessing your network. According to Bits, a New York Times...
What Must You Know About Lawful Interception?
Lawful interception, also known as lawful intercept or LI, is the security process that enables companies to provide law enforcement agencies and officials with access to private email messages or phone calls. In order for law enforcement...