Blog

Get news about our products, which events we are attending plus industry insights and commentary

Articles tagged with: Cyber Security

Detecting and Mitigating an Application Layer HTTP Flood DDoS Attack

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 01 November 2018. Posted in Cyber

Cybercriminals are increasingly using application layer Distributed Denial of Service (DDoS) to attack their victims. Unlike a Layer 3-4 DDoS attack that consumes network bandwidth, an application layer or L7 attack can be much smaller in traffic volume and can go unnoticed until too late. This type of attacks effectiveness lies in its ability to mimic genuine HTTP request traffic, usually going unnoticed until it too late. Application layer attacks of this nature are often part of a wider multi-vector DDoS that looks to disrupt different parts of a victim’s infrastructure.

Datacentre Cyber Security: 5th Datacentre India 2018 International Conference

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 08 October 2018. Posted in Cyber

Rohit Singh, Country Manager – AsiaPAC & India, Telesoft Technologies sat on a panel at the recent 5th Data Centre India 2018 International Conference to moderate a session and discuss all things cyber security and risk in the datacentre. Together with industry experts from Tata Projects, Juniper and Sterling & Wilson, Rohit and the panel discussed how datacentres are the backbone of today’s digital economy and are vulnerable to advanced persistent cyber-attacks, despite continued investment.

Cyber Security: What’s real. What’s important. What’s dangerous

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Thursday, 20 September 2018. Posted in Cyber, Events

I attended the Gartner Security and Risk Summit in London last week, where the keynote titled “Scaling Trust and Resilience — Cut the Noise and Enable Action”. The key message was that security professionals are drowning in data, making it difficult to see what is really happening, and to judge “What’s real, what’s important, what’s dangerous”.

Counting the cost of DDoS attacks

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Wednesday, 29 August 2018. Posted in Cyber

A Distributed Denial-of-Service DDoS attack occurs when high rate machine generated traffic, usually from compromised systems, floods the resources of a targeted system such as a webserver, making the service unusable by legitimate users. There are many reasons for hackers/hacktivist/state actors to initiate a DDoS attack – to damage a brand, to limit web based sales, to protest or for notoriety. After the initial incident response and triage, important questions will be asked, chief among them, what did the DDoS attack cost?

Oversight of UK's Critical National Infrastructure - Chinese Vendors

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Tuesday, 31 July 2018. Posted in Cyber, Government

In an industry awash with marketing hype, Critical National Infrastructure is, for once, an appropriate name – infrastructure that is critical to the continued safe and prosperous operation of a nation.

Infosecurity Europe 2018 Round-up

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Friday, 15 June 2018. Posted in Events

Over three days the infosec industry came together as 19,500+ industry professionals met with 400+ international exhibitors including Telesoft Technologies to learn about state-of-the-art cyber security and attend thought-provoking and inspiring seminars.

Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 18 April 2018. Posted in Cyber

Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the many threats that they face. Intrusion Detection Systems (IDS) are and have been an integral part of this defense system. The aim of deploying an IDS into a network is to be able to identify if something untoward is happening and hopefully to be able to trap and remediate a problem sooner rather than later.

Monitoring Tunnelled Protocols in hyper-scale Telco networks

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Wednesday, 21 March 2018. Posted in Cyber

Telecommunications providers are migrating data backbones to 100GbE to carry increasing traffic volume shared between multiple services and technologies such as mobile VoLTE, Virtual Network Functions (VNFs) and Software Defined Networking (SDN) infrastructure. Data is often exchanged through virtual tunnels, where threats can hide, making detection complex, decreasing network visibility and security.

Uncovering Malware in Hyper-scale DNS Traffic

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 07 March 2018. Posted in Cyber, 'Tech Talk' Blog

Cyber criminals have been using DNS for malicious purposes successfully for years,  malware such as DNSChanger uses DNS to target high value data held by ISP’s, CSP’s, CDN’s, Governments and Enterprise.

MWC 2018 Wrap Up Report

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 07 March 2018. Posted in Events

Every year Mobile World Congress rolls in to Barcelona and every year it does so with a bang and 2018 was no different, security was locked down tight after the unfortunate events that hit Barcelona last year. That did not however stop the tide of people and companies swarming to the event, GSMA reported that more than 107,000 visitors from 205 countries and territories visited over the 4 days.

[12  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.