TAP Into Technology Blog: IT Security (16)
Cybersecurity Threat Breakdown [TimeHop, Bithumb]
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you...
Challenges of Defending the Internet of Things
Do you remember what you were doing on October 21, 2016? Probably not, but I can tell you what you weren’t doing. You weren’t on Twitter, Spotify, Netflix, Reddit, Tumblr, or visiting so many other major websites.
Design-IT: Reverse Bypass Mode
There have been quite a few posts about the benefits of Bypass TAPs and how they can keep the network up and running in the event an inline appliance fails. But what about situations where the inline appliance is the main source of...
Cybersecurity Threat Breakdown [MyHeritage, Coca-Cola]
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you...
Ensure Complete Network Visibility for Your Incident Response Plan
Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. That’s why it’s now more important than ever before to use next generation threat intelligence combined...
TAP One Link to Add Resiliency to Your Cisco Deployment
As part of the Cisco Solution Partner Program, Garland Technology helps provide visibility and access for Cisco security and performance monitoring solutions. The partnership provides value to companies deploying Cisco products including...