Visit us at IoT World on Booth 752

Blog

Get news about our products, which events we are attending plus industry insights and commentary

Articles tagged with: Security

RSA Conference 2019: Cyber Security at Scale – In practice

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 28 February 2019. Posted in Cyber, Events

The annual US version of the RSA Conference is only days away, bringing together the world largest gathering of cyber security vendors and information security professionals, this year’s event promises to be the biggest yet.

New Lloyds Report outlines the impacts of a global ransomware attack

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 01 February 2019. Posted in Cyber

The report explores and analyses the risks, costs and damage that would be caused by a coordinated global ransomware attack. The scenario outlined predicts that from the time the attack is launched it would encrypt all data on nearly 30 million devices worldwide. 

Monitoring Tunnelled Protocols in hyper-scale Telco networks

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Wednesday, 21 March 2018. Posted in Cyber

Telecommunications providers are migrating data backbones to 100GbE to carry increasing traffic volume shared between multiple services and technologies such as mobile VoLTE, Virtual Network Functions (VNFs) and Software Defined Networking (SDN) infrastructure. Data is often exchanged through virtual tunnels, where threats can hide, making detection complex, decreasing network visibility and security.

Uncovering Malware in Hyper-scale DNS Traffic

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 07 March 2018. Posted in Cyber, 'Tech Talk' Blog

Cyber criminals have been using DNS for malicious purposes successfully for years,  malware such as DNSChanger uses DNS to target high value data held by ISP’s, CSP’s, CDN’s, Governments and Enterprise.

MWC 2018 Wrap Up Report

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 07 March 2018. Posted in Events

Every year Mobile World Congress rolls in to Barcelona and every year it does so with a bang and 2018 was no different, security was locked down tight after the unfortunate events that hit Barcelona last year. That did not however stop the tide of people and companies swarming to the event, GSMA reported that more than 107,000 visitors from 205 countries and territories visited over the 4 days.

5 Meta-data use cases every CISO should know about in 2018

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 18 January 2018. Posted in Cyber

If you enter “‘Big Data definition” in to any search engine, you will get the following result ‘extremely large data sets that may be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions’ or the Wikipedia result which is ‘Big data is data sets that are so voluminous and complex that traditional data processing application software is inadequate to deal with them. There are three dimensions to big data, which are ‘Volume, Variety and Velocity’’.

Is it important to differentiate between flows and conversations?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 09 November 2017. Posted in Cyber

There are many moving parts to a successful network security strategy, everything that makes a network a network such as e-mails, web requests and file transfers is a potential ‘route in’ for a security or compliancy issue. It’s important for those managing enterprise IT Systems to know everything about them, every bit of information is pertinent to ensuring a smoothly run operation.

Improving Enterprise Network Operational Efficiency

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 14 July 2017. Posted in Telecom, Company News

Despite a recent trend towards organisations outsourcing network security to third party management companies, a recent study conducted by Forcepoint clearly shows that most enterprises actually prefer internally managed full network visibility, control and flexibility to make their own choices about changes. 

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.