TAP Into Technology Blog: IT Security (14)
PacketMAX: Find your visibility truth
Designed to redefine how you approach your network, Garland Technology is excited to announce the launch of two new products to our purpose-built packet broker line. These products were specifically created to address critical needs of our...
Cybersecurity Threat Breakdown [Marriott + HSBC]
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...
Bypass vs Failsafe: What's the Difference?
Computer networking terminology can become overly fickle once vendor products get into the mix. To help alleviate some confusion, we’re going to go over some common terms that often throw customers for a loop and hopefully clear up some...
Advanced Persistent Threat Activity Exploiting Managed Service Providers
The National Cybersecurity and Communications Integration Center has been tracking attacks on global Managed Service Providers (MSP) from Advanced Persistent Threat actors since 2016. Targets of these attacks spread across Information...
The Smarter Things Network TAPs Do to Make Your Security Program Stronger
Make no mistake – securing your organization from outside cyber threats is one of the most difficult and challenging aspects of IT. In all likelihood, attackers are continually probing your network, seeking passwords, vulnerabilities or...
Cybersecurity Threat Breakdown [Ohio Hospital System + USPS]
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...