Check out all of our upcoming events

Blog

Get news about our products, which events we are attending plus industry insights and commentary

Infosecurity Europe 2017 Round-up

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Sunday, 18 June 2017. Posted in Cyber, Events

This year’s Infosecurity Europe began rather soggily at the Olypmia in London on Tuesday morning but the clouds soon cleared for an impressive and informative 3 days of keynotes, training and exhibitions, with over 17,972 visitors from over 77 countries, the show was a hive of cyber security innovation and education.

Infosecurity Europe 2017…cyber in the spotlight

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 18 May 2017. Posted in Cyber, Events

So, this week has been a huge week for the cyber security community, explained it on one fear inducing word ‘ransomware’ and when I say huge, we are talking about a global incident. The WannaCry (or WannaCrypt) cyber-attack has so far hit 150 countries, going after everything from critical national infrastructure, train stations to ATM machines.

Understanding Network Behaviour using NetFlow

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Thursday, 20 April 2017. Posted in Cyber

In briefest of terms NetFlow helps you understand who, what, where, when, and how network traffic is moving through the network. NetFlow is data generated by network devices – routers, switches, firewalls, etc. which contain information about ‘data in motion’ in a network. The term NetFlow is often used generally to refer to this type of information, but “NetFlow” is actually proprietary to Cisco. Other vendors have their own versions, such as J-Flow from Juniper, and sFlow. 

Forget elections, who’s hacking your details from online retailers?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Tuesday, 28 March 2017. Posted in Cyber

Do you save your personal details when you make a purchase online? Retailers often entice customers to open an ‘account’ and save payment details on the promise of receiving discounts on future purchases and speeding up the buying process for next time. We all do it but is our precious data safe? According to NTT Groups 2016 Global Threat Intelligence Report, retailers now experience the most cyber-attacks of any industry, to put into context that’s three times as many as the previous top target, the financial Industry.

Artificial Intelligence, machines learning to learn

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 16 March 2017. Posted in Cyber

Type Artificial Intelligence (A.I) or Machine Learning in to a search engine and you’re looking at around 2,000,000,000 (wow, that’s a lot of zeros!) results, I think it is fair to say that it’s a hot topic at the moment. In those results you will find articles describing how this new era of technology will change the shape of everything and should be viewed as a tool not a threat.

MWC 2017 Round Up: IoT Becoming a Reality

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 06 March 2017. Posted in Telecom, Events

Every year around 100,000 people descend on Barcelona to try and cut a deal or two at Mobile World Congress (MWC), arguably the biggest Telecoms show in the world, and 2017 did not disappoint. From the return of old favourites like the Nokia 3310 to the launch of plucky newcomers such as the LG 6G, MWC is a who’s who of the mobile industry, big and small and everyone in between.

Supporting cyber security training in UK schools

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 13 February 2017. Posted in Cyber, Company News

School children in England will be offered lessons in cyber security to help find the experts of the future to defend the UK from attacks. You could not attend a cyber security conference or show in 2016 without hearing that we need to do more to ensure that the next generation is fully prepared to keep pace with a landscape constantly evolving and predictable in its unpredictability.

What will an Interactive Voice Response System (IVR) look like in 2017?

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Wednesday, 30 November 2016. Posted in Telecom

An IVR is an automated phone system that can greet and direct callers based on the callers' identity, their responses and their service preferences. Employing people to sit around and answer phones all day can be a costly and inefficient for businesses of any size.

Flow versus packet capture

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 19 October 2016. Posted in Cyber

These techniques can be sorted into 3 categories. Statistical analysis, Behavioural analysis and packet-level analysis (raw data analysis). Each one has its merits and its use cases and we are going to explore in this blog what and how is the most effective way to use a combination of these tools to provide the best analysis.

Upcoming Tradeshows (Nov '16)

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 17 October 2016. Posted in Company News, Events

This year we are ‘Lead Community Sponsors’ and are hosting the evening event on the 9th Nov at the British Embassy, we are very pleased to have secured such a special venue for the evening reception, so be sure to reserve your conference space now.

<<  8 9 10 11 12 [1314 15  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.