TAP Into Technology Blog: IT Security (31)
The 6 Things to Consider When Choosing a Cyber Insurance Policy
Cyber insurance has quickly become a necessity just like any other corporate insurance. It’s being added to an ever-growing list of insurance policies that already includes plans for professional liability, director and officer liability,...
Planes, Trains and Automobiles: Transportation Hacking Headaches
No, we are not going to be talking about Steve Martin’s 1987 classic, Planes, Trains & Automobiles. That movie played off of frustratingly slow transportation around the holidays, giving Martin and John Candy free reign to make us laugh...
Cyber Phishing- $46.7M Stolen from One Company
What is known as “CEO fraud” and “business email compromise” is costing companies and individuals millions. Just ask Ubiquiti Network’s Inc. who recently suffered a devasting $46,700,000.00 fraud. This is a big one, one of the biggest...
Why Risk Traffic Overload? Anchor Firewalls with a Network TAP
As any InfoSec professional will tell you, traffic spikes can have a big effect on the performance of key security appliances including firewalls, advanced threat detection systems, forensic data capture and more. When the applications...
Smurfing and Other Mysterious Words in the Cyber World
Cyber world has its own language, often filled with acronyms and mysterious sounding words that both the good guys and the bad guys creatively come up with to describe what's happening on the dark side of the web. If you think a Smurf...
The Visibility Test: How to Give Security Devices a 360 View of Network Traffic
Complete network visibility is no longer a "nice to have" technology feature for security appliances such as firewalls, intrusion detection systems or forensic analyzers – it’s a “must have” requirement. Any security engineer that doesn’t...