TAP Into Technology Blog: IT Security (21)
Network TAP vs SPAN Port: Putting Them to the Test
For years now we all have read about the difference between data capture off a span/mirror port and a network TAP. Packet Pioneer, Chris Greer was interested to see the difference between a data stream captured on a network TAP versus a...
McAfee Resurrection - Can Real Collaboration Exist in the Security Ecosphere?
At Intel Security’s Focus 2016 conference, a small group of Security Innovation Alliance partners (SIA) gathered for an invitation-only session to learn about Intel Security changes - where the big 'McAfee is back' announcement was made....
[Get the Data You Want] Simplify PCI DSS Compliance with an MSSP
For years, the financial services industry was the most targeted industry for sophisticated cyber attackers (and some not so sophisticated). This was never too surprising—attackers often follow the money, starting with the low hanging...
Taking the Pain Out of HIPAA Compliance [Get the Data You Want]
The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 to keep sensitive patient data safe. It’s security rules have been published since 2003, and yet, nearly 35% of the record-setting number of reported data...
2016 Security Breaches: The Reality from the Predictions
At the beginning of 2016, I warned of key security threats that the world would face in the coming year. As I look back at those predictions, I realize that there are still critical insights to be gained from the numerous attacks that...
Top 7 Security Predictions for 2017
As a network TAP provider, Garland anchor's security solutions for so many organizations across all public and private sectors. I like to think that working with IT’s top security professionals has given Garland and myself unique insight...