TAP Into Technology Blog: IT Security (22)
How Will SDN Impact the Future of Network Security?
While software-defined networking (SDN) is slowly working its way toward having a real impact on how network architects can keep up with increasing demands, SDN adoption is on a collision course with another key networking...
Russian Hackers Eyeing Germany’s Election—Lessons Learned from America’s Struggles
No matter which side you stand on, we can all agree that 2016 was an unusually crazy election year. Aside from the actual politics, this was the first time we spent all year talking about election hacking. But we can’t just relax now that...
Russia’s 2016 Election Hacks—Major Implications for an Age-Old Problem
We talked about the vulnerability of presidential campaigns in March. We talked about the reality of election threats in September. And now, after almost a full year of discussion, we’re dealing with the aftermath—the FBI and CIA agree...
Protect Your Network: Know Your Baseline Traffic
Everyone knows that a standard doctor’s visit begins with a review of your vital signs. They take your blood pressure, check your breathing, read your pulse and take a look at your eyes, ears, nose and throat to get complete picture of...
Detecting Fake SSL Sessions as Part of C&C Activity
One of the best ways to learn how to protect against malware is to learn how to detect malware traffic. Towards this end, we are constantly searching the Internet for as many types of malware pcaps as we can find. This blog focuses on the...
[Demo] Chaining the Edge of your Network
In our recent webinar with Palo Alto Networks' Fuel User Group I asked the attendees a survey question: "How many security tools do you currently deploy?" The answer from the majority of the group was "4 or more." The attendees - all Fuel...