TAP Into Technology Blog: IT Security (9)
Cyber Security Threat Breakdown [2019 Recap]
Over the past year, we have seen way too many hacks and data breaches in the headlines. Here is your roundup of the largest cyber attacks from 2019, including causes, resolutions, and what you can do to protect your data.
Top 10 Security Challenges of 2019
In 2019 our team was at dozens of trade shows and conferences around the world. While we were out in the field, we surveyed thousands of people at events like CiscoLive, InfoSec, RSA, Cyber Security Summits, and FutureCons, asking them,...
How can your company become a leader in cloud security?
As companies continue to migrate workloads to the cloud, it’s quickly becoming clear that security strategies need to be re-evaluated and redesigned with these new tools and resources at the forefront. When you’re in planning mode to...
Failsafe Deployment of 100G Inline Security Tools with EdgeSafe Bypass TAPs
Today’s networks have become sophisticated defense mechanisms, architected with numerous inline security tools such as firewalls, intrusion prevention systems, web application firewalls, data loss prevention, SSL decryption and more. While...
MSSPs: The Pros and Cons of Outsourcing Network Security
When firewalls emerged to protect networks in the early 1990s, outsourcing cyber security to a Managed Security Service Provider (MSSP) wasn’t even a consideration. However, defending your network from sophisticated cyber attackers today...
Cybersecurity Threat Breakdown [Spooky Edition]
There’s nothing spookier than an unknown hacker accessing your data. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this series, I’ll share information and updates on the most recent hacks that I saw...