Check out all of our upcoming events


Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists

Cyber Security: What’s real. What’s important. What’s dangerous

Written by Steve Patton on Thursday, 20 September 2018. Posted in Cyber, Events

I attended the Gartner Security and Risk Summit in London last week, where the keynote titled “Scaling Trust and Resilience — Cut the Noise and Enable Action”. The key message was that security professionals are drowning in data, making it difficult to see what is really happening, and to judge “What’s real, what’s important, what’s dangerous”.

This is true for any sized enterprise, but critically so for large communications service providers, where some own physical networks (such as mobile network operators), and some own application infrastructure (such as social media messaging apps). But all have one thing in common; millions of data points, events and users.

The keynote discussed criticality, risk assessment, access controls and designing for resilience, to answer the “what’s”

  • To know what’s real - we need to use automation to quickly classify and categorise threats.
  • To know what’s important – We need to know what we are protecting. Take inventory, assess risk and monitor.
  • To know what’s dangerous – We need integrated risk management, design for resilience and share knowledge.

In a large communications service provider environment, the Telesoft TDAC uses multiple data sources including unsampled hi rate flow monitoring to discover physical and logical infrastructure (to know what’s important, taking inventory), enhances that data with reputation, application layer data and scanning for known signatures (to know what’s dangerous) combined with anomaly detection and alerting (to know what’s real).

To find out more – contact Telesoft at This email address is being protected from spambots. You need JavaScript enabled to view it.

About the Author

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.