TAP Into Technology Blog: IT Security (26)
Director of National Intelligence Cautions Presidential Candidates on Cyber Attacks
As if presidential candidates didn’t have enough on their plates defending themselves against their opponent’s attack ads, James Clapper has warned that they should expect to deal with cyberattacks. The Director recently went on record...
Four Roadblocks to Deploying a Full Stack of In-Line Security Appliances
It's hard to remember that the commercial firewall, as we know it today, has only been around since 1994. This was the first firewall that could monitor every layer of the OSI stack—a formidable obstacle to hackers. With more and more...
Planning for Visibility at Cisco Live! U.S. 2016
After attending Cisco Live Berlin back in February, we marked our calendars for July 10 to July 14 when the show comes to Las Vegas, NV. The Cisco Live shows are meant to bring the world’s foremost technology innovators together for an...
A Hybrid Approach Is the Future of MSSPs
Beyond the troubling data breach statistics, businesses of all sizes face a serious cyber security issue—a cyber skills shortage and the cost of hiring rare security network experts. The level of difficulty to build an expert in-house...
How Much is My Information Worth on the Dark Web?
In the April 5, 2016 report by the Identity Threat Resourse Center (ITRC) there have been 227 breaches which have compromised 6,214,514 records containing personally identifiable information (PII). The ITRC tracks data breaches involving...
IDS vs. IPS: It’s More Than a Character Difference
In modern cybersecurity, there are two major types of devices for protecting the edge: intrusion detection systems (IDS) and intrusion prevention systems (IPS). An IPS sits in-line, in a network, and touches on each packet to and from the...