Visit us at MWC 2019 in Hall 7 on stand 7C64

Blog

Get news about our products, which events we are attending plus industry insights and commentary

Articles tagged with: Network Security

DDoS Attack Vectors Evolve as Overall Number of Attacks Declines

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 08 February 2019. Posted in Cyber

In terms of DDoS attacks, 2019 has started with a bang! At the end of January reports surfaced of a massive DDoS attack that generated over 500 million packets per second, which was significantly larger than last year’s GitHub attack, which peaked at 129.6 million packets per second.

New Lloyds Report outlines the impacts of a global ransomware attack

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 01 February 2019. Posted in Cyber

The report explores and analyses the risks, costs and damage that would be caused by a coordinated global ransomware attack. The scenario outlined predicts that from the time the attack is launched it would encrypt all data on nearly 30 million devices worldwide. 

Utilising Contextual Threat Record in Intrusion Detection Systems (IDS)

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 09 January 2019. Posted in Cyber

Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams are often overloaded with information produced by their cyber security tools. This issue is even more problematic in Firewalls and Intrusion Detection Systems’s (IDS) at carrier scale, leading to ‘Alert Fatigue’ and false positives. 

Cyber Threat Visibility: Which threats should defenders be looking for?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 03 December 2018. Posted in Cyber

A network security team can only fight what they can see, an organisation’s network security depends on their ability to rapidly detect and respond to emerging threats across their infrastructure, whether that is Tier 1 Operator, Enterprise or Cloud Provider. However, attack methods and strategies are constantly evolving, making threat detection an always-moving target. A good base to start from is understanding what type of threats may lurking in your network, these threats look very different depending on throughput of network traffic.

Protecting a Content Delivery Network (CDN) from Cyber Attacks

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 22 November 2018. Posted in Cyber

A Content Delivery Network or CDN is a system of distributed servers and nodes that delivers web content to a user, based on the geographical location of the user, the origin of the webpage and the content delivery service. The purpose of the CDN is to avoid bottle necks that would occur if every user tried to access content from one central location, the CDN replicates and redirects content so it is available to many users all at once. Ultimately improving user experience across multiple geographical locations (i.e. not just to those users who are physically closest to the server with the original content) and easing pressure on network infrastructure resources.

Datacentre Cyber Security: 5th Datacentre India 2018 International Conference

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 08 October 2018. Posted in Cyber

Rohit Singh, Country Manager – AsiaPAC & India, Telesoft Technologies sat on a panel at the recent 5th Data Centre India 2018 International Conference to moderate a session and discuss all things cyber security and risk in the datacentre. Together with industry experts from Tata Projects, Juniper and Sterling & Wilson, Rohit and the panel discussed how datacentres are the backbone of today’s digital economy and are vulnerable to advanced persistent cyber-attacks, despite continued investment.

Breaking Down DDoS UDP Flood Attacks

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 03 October 2018. Posted in Cyber

A UDP flood is a type of volume based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Datagram Protocol) packets are sent to a target server, limiting its ability to carry out its functions. UDP traffic doesn’t require a three-way handshake to make a connection like TCP (Transmission Control Protocol), it runs with lower overhead and is ideal to carry data that doesn’t need to be checked and rechecked, such as VoIP. This means it is easier for attackers to generate large traffic volumes with tools like Low Orbit Ion Cannon (LOIC) and UDP Unicorn.

Counting the cost of DDoS attacks

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Wednesday, 29 August 2018. Posted in Cyber

A Distributed Denial-of-Service DDoS attack occurs when high rate machine generated traffic, usually from compromised systems, floods the resources of a targeted system such as a webserver, making the service unusable by legitimate users. There are many reasons for hackers/hacktivist/state actors to initiate a DDoS attack – to damage a brand, to limit web based sales, to protest or for notoriety. After the initial incident response and triage, important questions will be asked, chief among them, what did the DDoS attack cost?

Detecting Cryptojacking in Carrier Scale Networks

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Monday, 06 August 2018. Posted in Cyber

Cryptojacking is running unwanted applications on endpoints and infrastructure, specifically crypto currency mining software, and it’s hard to detect. The cypto miner is stealing processing capability; Impacts are higher electricity (power and cooling) consumption, slower performance of legitimate applications or services. And high CPU run rates generate more heat and reduce lifetime.

Infosecurity Europe 2018 Round-up

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Friday, 15 June 2018. Posted in Events

Over three days the infosec industry came together as 19,500+ industry professionals met with 400+ international exhibitors including Telesoft Technologies to learn about state-of-the-art cyber security and attend thought-provoking and inspiring seminars.

[12 3  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.