TAP Into Technology Blog: IT Security (24)
The Current State of Hacking—And What to Expect in 2017
Surprise! 2016 is on pace to break records in terms of data breach volume—a feat that seems to be accomplished on an annual basis now. Through August 30, the Identity Theft Resource Center (ITRC) has counted 638 total data breaches with...
Mr. Robot Revisited - Season 2
Last year, I was one of the many viewers transfixed with Mr. Robot, USA networks' hybrid IT-science-thriller show. Both the realism of the character Elliot Anderson as coder/hacker/vigilante and the controlled panic of how cyber security...
Hijacking Healthcare: Is DTSec Regulation the Solution for IoT enabled devices?
The recent jump in cyber attacks against the healthcare industry—especially ransomware attacks—aren’t a coincidence. The reality is that the healthcare industry presents the perfect opportunity for attackers. A balance of valuable personal...
Hacking Education - The Next Soft Target
When you send your precious 5 year old off to Kindergarten this year, not only do you need to worry about bullying, drugs and homework, now add hacking their personal identifiable information (PII) to the list. We’ve read or experienced...
Is There A Difference? Bypass Switch vs. Bypass TAP
I love talking with engineers and CISOs and listening to how they describe situations, devices and challenges within networking. The IT world loves acronyms, tech terms and jargon, but what surprises me is that manufacturers, resellers,...
Load Balancing at the Edge – Saves Budget While Keeping Up with Network Speed
Every security architect is facing the same problem today—pack more in-line security appliances into the stack on a limited budget. However, the challenge goes deeper than simply adding DDoS protection to your existing intrusion prevention...