Visit us at IoT World on Booth 752

Blog

Get news about our products, which events we are attending plus industry insights and commentary

Cyber

The Evolution of NFV Network Visibility and Security at Scale

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Wednesday, 27 March 2019. Posted in Cyber

NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructure.  This reduces previously proprietary network functions that ran on dedicated hardware into software building blocks that run on commodity hardware.

Discover More: Maximising the value of Flow Data for the SOC

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 22 March 2019. Posted in Cyber

Security analytics and network visibility tools used by defenders collect as much useful data as possible to improve anomaly detection accuracy. This gives defenders proactive network security monitoring and alerting for attempted cyber-attacks or incidents that are in progress.

SSL Based Cyber-attacks Increase by 400% Over the Last Year

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 15 March 2019. Posted in Cyber

A new report found that last year there had been a 400% increase in SSL-based phishing threats, criminals are increasingly using encryption as part of their toolkit to evade detection and launch malware

Pioneering Women of Information Security: Dorothy Denning and Rebecca Bace

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 07 March 2019. Posted in Cyber

As we celebrate International Women’s Day, we have chosen to honour two women who were vital to the design and development of Intrusion Detection Systems (IDS). Dorothy E. Denning and Rebecca Base were information security experts and pioneers who both played significant roles in the development of IDS.

RSA Conference 2019: Cyber Security at Scale – In practice

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 28 February 2019. Posted in Cyber, Events

The annual US version of the RSA Conference is only days away, bringing together the world largest gathering of cyber security vendors and information security professionals, this year’s event promises to be the biggest yet.

What to Expect from MWC 2019, from Folding Smartphones to Cyber Security

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 20 February 2019. Posted in Cyber, Events

Less than a week to go until MWC19 Barcelona, one of the largest mobile industry events in the world, bringing together the latest innovations and cutting-edge technology from more than 2,400 organisations.

DDoS Attack Vectors Evolve as Overall Number of Attacks Declines

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 08 February 2019. Posted in Cyber

In terms of DDoS attacks, 2019 has started with a bang! At the end of January reports surfaced of a massive DDoS attack that generated over 500 million packets per second, which was significantly larger than last year’s GitHub attack, which peaked at 129.6 million packets per second.

New Lloyds Report outlines the impacts of a global ransomware attack

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 01 February 2019. Posted in Cyber

The report explores and analyses the risks, costs and damage that would be caused by a coordinated global ransomware attack. The scenario outlined predicts that from the time the attack is launched it would encrypt all data on nearly 30 million devices worldwide. 

Packet De-duplication Techniques at Carrier Scale

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 25 January 2019. Posted in Cyber

The definition of packet duplication is pretty simple; a duplicate packet is any packet that is identical to another packet. However, just because it’s easy to define doesn’t mean it doesn’t cause a significant headache for Network Engineers and System Analysts.

What is Multi-layered Threat Detection and Mitigation?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 18 January 2019. Posted in Cyber

The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by what type of network you are protecting. Targeted cyber-attacks use an increasing catalogue of clever tactics and innovative attack vectors which are reshaping corporate and governmental security strategies, while wreaking havoc in consumer markets.

[12 3 4 5  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.