Check out all of our upcoming events

Blog

Get news about our products, which events we are attending plus industry insights and commentary

Part 3: The Cutting Edge of Smart Cities

on Friday, 23 August 2019. Posted in Cyber

Edge computing and fog technologies continue to advance as the technological industry continues to push concepts such as Autonomous Vehicles (AVs), making them seem less of a concept and more of an actual capability which we will likely be using in the coming years.

Twitter Party - Product Launch

on Friday, 23 August 2019. Posted in Company News

The rise of the Botnet

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Friday, 16 August 2019. Posted in Cyber

Good Bots & Bad Bots.

Red or Blue team: Who do you rep?

on Wednesday, 14 August 2019. Posted in Cyber

The 400 Gig Triton is a Cyber Warfare Simulation appliance which has the ability to generate natural looking background traffic with true source and destination IP randomisation on every traffic loop to make highly entropic traffic.

Part 2: What is driving the growth of Edge technology and where is it heading?

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Wednesday, 14 August 2019. Posted in Cyber

What is driving the growth of Edge technology and where is it heading?

Part 1: Edge Computing IoT & the scalability of virtual infrastructure

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Tuesday, 06 August 2019. Posted in Cyber

The Edge is starting to disappear from view, slowly being covered by the Fog…metaphorically at least!

Data generation is increasing, so too should data storage...

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Monday, 29 July 2019. Posted in Cyber

Data generation is increasing, so too should data storage.

FaceApp – a big data security threat or just smoke?

on Monday, 22 July 2019. Posted in Cyber

FaceApp – a big data security threat or just smoke?

From Soldier to Cyber Intelligence & Security

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Friday, 19 July 2019. Posted in Cyber

The journey of a  Soldier and how he moved into Cyber Intelligence & Security.

Cyber Intelligence for Shipping assets

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Tuesday, 16 July 2019. Posted in Cyber

Warning of the low cyber security awareness and intelligence within the shipping sector...

[12 3 4 5  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.