Blog

Get news about our products, which events we are attending plus industry insights and commentary

Is it important to differentiate between flows and conversations?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 09 November 2017. Posted in Cyber

There are many moving parts to a successful network security strategy, everything that makes a network a network such as e-mails, web requests and file transfers is a potential ‘route in’ for a security or compliancy issue. It’s important for those managing enterprise IT Systems to know everything about them, every bit of information is pertinent to ensuring a smoothly run operation.

Driving data rates, iPhone 8 launch

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 09 October 2017. Posted in Cyber

The iPhone 8 and 8 Plus were released around the world with much fanfare last week.  As Apple's newest smartphone, the company have improved some of the main features found on current products, as well as adding new ones such as wireless charging. Subscribers can order the new iPhone from most of the major mobile networks, for example here in the UK EE Mobile, O2, Vodafone, Carphone Warehouse, Three Mobile and Sky Mobile.

CeX Data Breach – Up to 2 million customer’s personal data compromised

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Tuesday, 05 September 2017. Posted in Cyber

Second hand games and electronics store CeX last week issued a statement notifying their customers of a massive online security breach. CeX said that everything from passwords, customers’ names, physical addresses, email addresses, phone numbers and encrypted data from expired credit and debit cards from 2009 were exposed in an attack conducted by “an unauthorized third party” that illegally accessed the company’s computer systems.

Spotting a DDoS attack in your network

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 17 August 2017.

‘Blizzard Entertainment Hit With Weekend DDoS Attack’, ‘World of Warcraft, Overwatch, Hearthstone and other games hit by DDoS’ and ‘Kids these days: the 16-year-old behind 1.7 million DDoS attacks’ are just three of the headlines about DDoS attacks in August, I didn’t open the other 19,000 results. I think it is fair to say that DDoS attacks are a very real threat, the tools for which are easily accessible or bought and unfortunately potential victims are currently not prepared for an attack.

HBO Hack: The spoilers of war

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 10 August 2017. Posted in Cyber

Unless you having been hiding under a rock or binge watching the new Game of Thrones series, you will have heard about the latest ‘big’ hack currently playing out in the press. HBO, the studio behind some of the most successful shows on TV, such as Game of Thrones (GoT) has been hacked. 

Cyber Security: Without knowledge there is no wisdom

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B product manager and leader, former board member and all round expert on everything cyber, telecom. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Thursday, 03 August 2017. Posted in Cyber

We took the knowledge we have gained from over 28 years of experience and asked how is wisdom applied in the cyber security industry and, alas, in what areas we may see it lacking...

Improving Enterprise Network Operational Efficiency

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 14 July 2017. Posted in Telecom, Company News

Despite a recent trend towards organisations outsourcing network security to third party management companies, a recent study conducted by Forcepoint clearly shows that most enterprises actually prefer internally managed full network visibility, control and flexibility to make their own choices about changes. 

In a connected IoT driven world, is Silicon Valley still the place to be?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 06 July 2017. Posted in Company News

Whether you’re a venture capitalist wanting to invest in the next Apple or Facebook, or an engineer searching for the most innovative company to work for, Silicon Valley is to the tech world what Stonehenge is to a druid.

When hunting in multi-100G network data lakes, you need to be carrying the biggest harpoon

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 03 July 2017. Posted in Cyber

It’s a challenging puzzle – network data is increasing at a rate faster than virtually all network analytics, security and forensics platforms can keep up with. Legacy network and behavioural analytics platforms drown in the resultant data lake.

Infosecurity Europe 2017 Round-up

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Sunday, 18 June 2017. Posted in Cyber, Events

This year’s Infosecurity Europe began rather soggily at the Olypmia in London on Tuesday morning but the clouds soon cleared for an impressive and informative 3 days of keynotes, training and exhibitions, with over 17,972 visitors from over 77 countries, the show was a hive of cyber security innovation and education.

[12 3 4  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.