Check out all of our upcoming events

Blog

Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists

Articles tagged with: Next Generation IDS

Detecting and Preventing Data Exfiltration

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 02 May 2019. Posted in Cyber

Data exfiltration is a form of security breach that occurs when an organisations data is copied, transferred or retrieved from a computer or server without authorisation. Data exfiltration can be difficult to detect, as it is often the last stage of a cyber security attack, once compromised the malware orchestrating the attack can lay dormant until the point of data exfiltration or it can take data little by little over time. It can do this because it involves the transfer or moving of data within and outside a network, which closely resembles or mimics typical network traffic, allowing substantial data loss incidents to fly under the radar.

Pioneering Women of Information Security: Dorothy Denning and Rebecca Bace

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 07 March 2019. Posted in Cyber

As we celebrate International Women’s Day, we have chosen to honour two women who were vital to the design and development of Intrusion Detection Systems (IDS). Dorothy E. Denning and Rebecca Base were information security experts and pioneers who both played significant roles in the development of IDS.

Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 18 April 2018. Posted in Cyber

Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the many threats that they face. Intrusion Detection Systems (IDS) are and have been an integral part of this defense system. The aim of deploying an IDS into a network is to be able to identify if something untoward is happening and hopefully to be able to trap and remediate a problem sooner rather than later.

Are you using Event Driven Security Automation?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 31 January 2018. Posted in Cyber

Everyone in the infosec community will agree that Intrusion Detection Systems (IDS) are an important component in any effective cyber security strategy, perhaps not the most press worthy but integral to policing your network borders. Much like a burglar alarm, an IDS is timeless in its effectiveness in detecting and alerting that someone has breached perimeter security measures.  However, IDS technology is not evolving at the pace it once did but that doesn’t mean that there aren’t exciting innovations and changes happening.

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.