Check out all of our upcoming events


Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists


5 Actionable Steps You Can Take To Prevent a Cyber Attack

on Friday, 03 January 2020. Posted in Cyber

At a recent talk, BlackHat Europe 2019, A.P. Moller Maersk A/S Chief Information Security Officer, Andrew Powell, narrated Maersk’s response to NotPetya, which provided a very interesting insight into how Maersk dealt with falling victim to such an attack. According to Andrew Powells’ methodology, the key to this is plain and simple; ‘transparency.’

The APT Series: APT Attack Process Infographic

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Wednesday, 20 November 2019. Posted in Cyber

To wrap up our three part APT blog series we have created ​an infographic which shows the five stages of an APT attack, offering opportunity for identifcation. Advanced Persistent Threats (APTs) are complex and efficient cyber espionage campaigns, seeking to gain intelligence from Industry leaders and Critical National Infrastructure. Using the latest tools, with strong threat intelligence, continual testing and a strong human firewall are all key elements to making sure you stay one step ahead of APT groups.

The APT Series Part 3: The Future of Advanced Persistent Threat Groups

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Tuesday, 22 October 2019. Posted in Cyber

Rise in sovereign data laws shows how weaponised data has become. Data continues to grow day by day, driven by 5G, the Internet of Things (IoT), Industry 4.0, Smart Cities and network evolutions. This rise in data is resulting in a large emphasis being placed on Edge technologies, cloud storage solutions and big data in the form of data lakes. All of this is in an effort to handle the enormous amounts of data that is being generated every second with an attempt to limit the on premise resources required by organisations across the globe. It has been estimated that by 2025, as much as 463 exabytes of data will be created globally, every day

The APT Series Part 2 'APT33'

on Friday, 11 October 2019. Posted in Cyber

The Elfin team are more commonly known as APT33 (they also go by other names like Refined Kitten, Magnallium and Holmium) and have been identified to be supported and sponsored by the Iran Government. APT33 have been operating since 2013.

The APT Series Part 1 'What is an Advanced Persistent Threat? '

on Thursday, 26 September 2019. Posted in Cyber

APT groups are an enduring threat to every nation state across the world, their patterns of life and attack behaviour are constantly evolving and closely follow the interests of their state backers.

Sustainable Smart Cities in the Sand

on Monday, 23 September 2019. Posted in Cyber

The idea of Sustainable Smart Cities can be a true driving force to social and economic growth and happiness. Giving a chance for improvement in services from transport to utilities and more, displaying better efficiency and optimisation through its use.

What do you mean we are flying blind?

on Wednesday, 28 August 2019. Posted in Cyber

The drive towards the use of cloud computing, cloud platforms and cloud data storage within most industries has been prompted by the need to reduce costs, consolidate data, reduce the business footprint and outsource the responsibilities of those assets to another party this heavy move towards the adoption of cloud is shown by 81 percent of organisations using a multi-cloud strategy

Part 3: The Cutting Edge of Smart Cities

on Friday, 23 August 2019. Posted in Cyber

Edge computing and fog technologies continue to advance as the technological industry continues to push concepts such as Autonomous Vehicles (AVs), making them seem less of a concept and more of an actual capability which we will likely be using in the coming years.

ICS Networks: How secure are they?

on Monday, 19 August 2019. Posted in Cyber

A major topic discussed at BlackHat 2019 was the vulnerability and attack vectors exposed in Industrial networks, which also gave an eye opening insight into the possible repercussions of a successful attack.

The rise of the Botnet

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Friday, 16 August 2019. Posted in Cyber

Good Bots & Bad Bots.

[12 3 4 5  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.