Profitap Blog

Recent Posts

Stay up to date



HPAQ Question 3 Answer: How to find login credentials in Wireshark

HPAQ Question 3 Answer: How to find login credentials in Wireshark

What is the login and the password I used? All the clues you need will be in this trace.pcapng file...
Read more
The Importance of Network TAPs Recovery Time

The Importance of Network TAPs Recovery Time

When it comes to network monitoring, Ethernet TAPs are crucial because SPAN ports on switches may...
Read more
HPAQ Question 1 Answer: How to detect credential stuffing

HPAQ Question 1 Answer: How to detect credential stuffing

Credential stuffing has been on the rise and you have seen countless stories on your cybersecurity...
Read more
What Are Network TAPs? And Why Do We Need Them?

What Are Network TAPs? And Why Do We Need Them?

When you think of the word tap, what comes to mind? Perhaps you imagine it to be a water tap or...
Read more
Optimizing Network Packet Broker Efficiency with Aggregation TAPs

Optimizing Network Packet Broker Efficiency with Aggregation TAPs

SPAN ports were the preferred approach to network visibility for years. However, when the...
Read more
Monitoring the Industry 4.0 Network Infrastructure with IOTA

Monitoring the Industry 4.0 Network Infrastructure with IOTA

The Internet of Things, commonly known as IoT, is no longer the “next big thing”. In the last two...
Read more
Basic Rules for Network Data Visualization Access

Basic Rules for Network Data Visualization Access

More and more managers and system admins feel challenged when dealing with the mass of information...
Read more
ProfiShark Long-Term Traffic Capture Use Case

ProfiShark Long-Term Traffic Capture Use Case

Sometimes, we cannot find the key of the problem from just a small trace file. We may find the...
Read more
How to Detect If a Rootkit Compromised Your System

How to Detect If a Rootkit Compromised Your System

The importance of having a quality network test access port (TAP) when conducting Digital Forensics...
Read more