Check out all of our upcoming events

Blog

Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists

Articles tagged with: Cyber Security

Women in Tech: Decreasing the Gender Gap in the Technology Industry

on Thursday, 24 October 2019. Posted in Company News

According to a recent PwC report only 15% of people working in STEM roles in the UK are female. In their infographic, PwC report that some of the reasons females don’t consider a career in tech is a lack of information on what these roles entail and a lack of role models to look up to. We are lucky enough to have a few women working in tech roles at Telesoft Technologies. One of which is Gemma Curtis, who joined as an Apprentice Systems Test Engineer in 2017.

The APT Series Part 3: The Future of Advanced Persistent Threat Groups

Posted by

Robert Fitzsimons

Robert Fitzsimons

Rob is a Field Applications Engineer with a background in Military Intelligence who recently completed his BSc (Hons) Intelligence and Cyber Security degree.

on Tuesday, 22 October 2019. Posted in Cyber

Rise in sovereign data laws shows how weaponised data has become. Data continues to grow day by day, driven by 5G, the Internet of Things (IoT), Industry 4.0, Smart Cities and network evolutions. This rise in data is resulting in a large emphasis being placed on Edge technologies, cloud storage solutions and big data in the form of data lakes. All of this is in an effort to handle the enormous amounts of data that is being generated every second with an attempt to limit the on premise resources required by organisations across the globe. It has been estimated that by 2025, as much as 463 exabytes of data will be created globally, every day

Threat Hunting and Network Monitoring with NetFlow at Scale

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 14 June 2019. Posted in Cyber

As 5G is rolled out globally, mobile carriers will benefit from significant revenue opportunities driven by growth in the mobile market, from better customer service to new 5G-enabled business models. However, the industry also recognises that 5G will dramatically raise the stakes for those who are tasked with ensuring the security and reliability of these networks.

Network Visibility in the 100/25GbE High Density Data Centre Era

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 30 May 2019. Posted in Cyber

As the demand for bandwidth continues to grow, the migration from 100G to 400G will be the next developmental step in data centre architecture. Research from Crehan Research Inc. shows that shipments of 10GbE and 40GbE data centre switches each declined in 2018, while 25GbE and 100GbE continued to grow significantly, signalling that we are now solidly in the 100/25GbE era.

Detecting and Preventing Data Exfiltration

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 02 May 2019. Posted in Cyber

Data exfiltration is a form of security breach that occurs when an organisations data is copied, transferred or retrieved from a computer or server without authorisation. Data exfiltration can be difficult to detect, as it is often the last stage of a cyber security attack, once compromised the malware orchestrating the attack can lay dormant until the point of data exfiltration or it can take data little by little over time. It can do this because it involves the transfer or moving of data within and outside a network, which closely resembles or mimics typical network traffic, allowing substantial data loss incidents to fly under the radar.

Discover More: Maximising the value of Flow Data for the SOC

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 22 March 2019. Posted in Cyber

Security analytics and network visibility tools used by defenders collect as much useful data as possible to improve anomaly detection accuracy. This gives defenders proactive network security monitoring and alerting for attempted cyber-attacks or incidents that are in progress.

SSL Based Cyber-attacks Increase by 400% Over the Last Year

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 15 March 2019. Posted in Cyber

A new report found that last year there had been a 400% increase in SSL-based phishing threats, criminals are increasingly using encryption as part of their toolkit to evade detection and launch malware

Pioneering Women of Information Security: Dorothy Denning and Rebecca Bace

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 07 March 2019. Posted in Cyber

As we celebrate International Women’s Day, we have chosen to honour two women who were vital to the design and development of Intrusion Detection Systems (IDS). Dorothy E. Denning and Rebecca Base were information security experts and pioneers who both played significant roles in the development of IDS.

RSA Conference 2019: Cyber Security at Scale – In practice

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 28 February 2019. Posted in Cyber, Events

The annual US version of the RSA Conference is only days away, bringing together the world largest gathering of cyber security vendors and information security professionals, this year’s event promises to be the biggest yet.

What to Expect from MWC 2019, from Folding Smartphones to Cyber Security

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 20 February 2019. Posted in Cyber, Events

Less than a week to go until MWC19 Barcelona, one of the largest mobile industry events in the world, bringing together the latest innovations and cutting-edge technology from more than 2,400 organisations.

[12 3  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.