RESOURCES

Cyber Security

Cyber Security

Insecure Enterprise Networks: The cost of data breaches vs the cost of network security for businesses

In July 2020, CWT global paid out $4.5 million as a consequence of one of the most expensive ransomware attacks of all t...

Enterprise network visbility
Cyber Security

IoT New Regulations

International Data Corporation (IDC) estimates that by 2025, there will be 41.6 billion connected IoT devices. However, ...

Engineer
Cyber Security

What does the lack of IoT security mean for 5G?

The Internet of Things (IoT) has surged in popularity in recent years, with consumers embracing interconnected technolog...

IoT Security for 5G
Cyber Security

Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)

Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the ...

Abstract network visualisation background
Cyber Security

Cyber Threat Visibility: Which threats should defenders be looking for?

A network security team can only fight what they can see, an organisation’s network security depends on their ability to...

Abstract network visualisation background
Cyber Security

Cyber Intelligence for Shipping assets

ENISA produced its first EU-report on Maritime Cyber Security back in 2011, warning of the low cyber security awareness ...

Abstract network visualisation background
Cyber Security

Breaking Down DDoS UDP Flood Attacks

A UDP flood is a type of volume-based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Data...

Abstract network visualisation background
Cyber Security

Protecting a Content Delivery Network (CDN) from cyber attacks

A Content Delivery Network or CDN is a system of distributed servers and nodes that delivers web content to a user, base...

Abstract network visualisation background
Cyber Security

Securing Mobile Networks

Legacy telecommunications protocols have stood the test of time, underpinning the foundations of our day-to-day communic...

Telesoft Telco abstract visualisation
Cyber Security

Infographic: The cyber security visibility puzzle

APT groups are constantly seeking new targets and evaluating opportunities for data espionage, sabotage, and theft. One ...

Abstract network visualisation background
Cyber Security

FaceApp – a big data security threat or just smoke?

FaceApp has officially gone viral and while many people are enjoying seeing how they would look when they are older, man...

Abstract network visualisation background
Cyber Security

Data generation is increasing, so too should data storage

Big data security threats are nothing new. We continue to see conversations and articles surrounding IoT, Edge computing...

Abstract network visualisation background
Cyber Security

The Evolution of NFV Network Visibility and Security at Scale

NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructu...

Abstract network visualisation background
Cyber Security

What do you mean we are flying blind?

The drive towards the use of cloud computing, cloud platforms and cloud data storage within most industries has been pro...

Abstract network visualisation background
Cyber Security

Part 2 : What is driving the growth of Edge technology and where is it heading?

Whilst the Cloud will continue to remain a cornerstone of virtual computing power, with Fog computing looking to ease so...

Abstract network visualisation background
Cyber Security

The APT Series Part 2 ‘APT33’

Seeing an attacker enables you to defend against them, a way to effect this is to lay over the physical network and its ...

Abstract network visualisation background

Nucleus: Repository of cyber security information

The latest industry news, threats, advice and information from our network and cyber security specialists.

Telesoft use cookies to improve your browsing experience.