Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

The 6 Levels Of Thwarting Network Security Issues

No matter what type of organization you have, you always run the risk of a network security issue. There are internal risks, of course, and every business has connections to outside vendors that introduce your network to the unknown.
Read More

Cybersecurity Threat Breakdown [TimeHop, Bithumb]

on 7/26/18 8:00 AM By | Chris Lauzze | 0 Comments | Network Security Hacks and Data Breaches
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you can do to protect your data.
Read More

Challenges of Defending the Internet of Things

on 7/10/18 8:00 AM By | Chris Bihary | 0 Comments | Network Security
Do you remember what you were doing on October 21, 2016? Probably not, but I can tell you what you weren’t doing. You weren’t on Twitter, Spotify, Netflix, Reddit, Tumblr, or visiting so many other major websites.
Read More

Design-IT: Reverse Bypass Mode

on 7/3/18 8:00 AM By | Jonathan Devoy | 0 Comments | Network Security DesignIT
There have been quite a few posts about the benefits of Bypass TAPs and how they can keep the network up and running in the event an inline appliance fails. But what about situations where the inline appliance is the main source of security for the network, and the company has zero tolerance for unsecured traffic? In those cases, the Bypass TAP has a “Reverse Bypass Mode” to accommodate for just that.
Read More

Cybersecurity Threat Breakdown [MyHeritage, Coca-Cola]

on 6/28/18 8:00 AM By | Chris Lauzze | 0 Comments | Network Security Hacks and Data Breaches
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you can do to protect your data.
Read More

Ensure Complete Network Visibility for Your Incident Response Plan

on 6/7/18 8:00 AM By | Chris Bihary | 0 Comments | Network Security Hacks and Data Breaches
Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. That’s why it’s now more important than ever before to use next generation threat intelligence combined with network visibility to add an additional layer of security to your network.
Read More