RESOURCES

Cyber Security

Cyber Security

Securing Identity Access Management (IAM) Platforms

Identity Access Management (IAM) platforms are a highly adopted security solution, growing in popularity, and rightly so...

iam
Cyber Security

What are the Implications of Quantum Computing for Cyber Security?

In recent years, the technology sector has been alive with discussions around quantum computing and how it promises to r...

Quantum
Cyber Security

The Growing Threat of AI-Powered Cyber Attacks

The use of artificial intelligence (AI) within the cyber threat landscape is a growing concern for organisations across ...

AI BLOG 2
Cyber Security

The Importance of Microburst Detection and Reduced Latency in the Financial Industry

smaller finance blog
Cyber Security

What Cyber Security Practices Should SMEs Prioritise Amidst Resource Limitations?

Tightening budgets and a shortfall in cyber security professionals are barriers to SMEs having the cyber security standa...

padlock 2
Cyber Security

The Challenges of Testing vCCAP Infrastructure

Migrating to vCCAP infrastructure provides flexibility and cost savings for cable operators, but simultaneously presents...

vCCAP Blog
Cyber Security

Guardians of the Network: The Rise Of Ethical Hackers

Ethical Hackers
Cyber Security

What goes on in the Shadows: Addressing the Looming Threat of Shadow IT

This article explores what shadow IT is, why employees use it and how it can be effectively addressed.

shadow IT pic
Cyber Security

The Most Important Cyber Security Trends in 2023 and Beyond | Advances in Threats and Tech

In today's fast-paced digital world, cyber security is more important than ever before. As technology continues to advan...

city
Cyber Security

Understanding the Risks of Supply Chain Cyber Attacks

As businesses become increasingly reliant on technology, the potential for cyber attacks on supply chains continues to r...

supply chain picture
Cyber Security

Artificial Intelligence: A Friend or Foe for Cyber Security?

As the use of AI and the speed of its development rapidly increases, we investigate its impact on cyber security.

Artificial Intelligence
Cyber Security

Cyber Security Challenges in Education

The education sector has always been highly targeted by cyber criminals, we take a look at some of the challenges faced ...

cyber-schools-header
Cyber Security

Vulnerability Assessments & Threat Hunting – Why you should be combining the two

Combining vulnerability assessments and pro-active threat hunting can help to identify weaknesses and deep dive into you...

Cyber news graphic
Cyber Security

Insecure Enterprise Networks: The cost of data breaches vs the cost of network security for businesses

In July 2020, CWT global paid out $4.5 million as a consequence of one of the most expensive ransomware attacks of all t...

Enterprise network visbility
Cyber Security

IoT New Regulations

International Data Corporation (IDC) estimates that by 2025, there will be 41.6 billion connected IoT devices. However, ...

Engineer
Cyber Security

What does the lack of IoT security mean for 5G?

The Internet of Things (IoT) has surged in popularity in recent years, with consumers embracing interconnected technolog...

IoT Security for 5G
Cyber Security

Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)

Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the ...

Abstract network visualisation background
Cyber Security

Cyber Threat Visibility: Which threats should defenders be looking for?

A network security team can only fight what they can see, an organisation’s network security depends on their ability to...

Abstract network visualisation background
Cyber Security

Cyber Intelligence for Shipping assets

ENISA produced its first EU-report on Maritime Cyber Security back in 2011, warning of the low cyber security awareness ...

Abstract network visualisation background
Cyber Security

Breaking Down DDoS UDP Flood Attacks

A UDP flood is a type of volume-based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Data...

Abstract network visualisation background
Cyber Security

Protecting a Content Delivery Network (CDN) from cyber attacks

A Content Delivery Network or CDN is a system of distributed servers and nodes that delivers web content to a user, base...

Abstract network visualisation background
Cyber Security

Securing Mobile Networks

Legacy telecommunications protocols have stood the test of time, underpinning the foundations of our day-to-day communic...

Telesoft Telco abstract visualisation
Cyber Security

Infographic: The cyber security visibility puzzle

APT groups are constantly seeking new targets and evaluating opportunities for data espionage, sabotage, and theft. One ...

Abstract network visualisation background
Cyber Security

Preparing for Cyber Warfare: Strengthen your NetSecOps with nation-scale attack simulation

The cyber landscape continues to be a challenging place for public and private organisations alike. Both are often on th...

Abstract network visualisation background
Cyber Security

FaceApp – a big data security threat or just smoke?

FaceApp has officially gone viral and while many people are enjoying seeing how they would look when they are older, man...

Abstract network visualisation background
Cyber Security

Data generation is increasing, so too should data storage

Big data security threats are nothing new. We continue to see conversations and articles surrounding IoT, Edge computing...

Abstract network visualisation background
Cyber Security

The Evolution of NFV Network Visibility and Security at Scale

NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructu...

Abstract network visualisation background
Cyber Security

What do you mean we are flying blind?

The drive towards the use of cloud computing, cloud platforms and cloud data storage within most industries has been pro...

Abstract network visualisation background
Cyber Security

Part 2 : What is driving the growth of Edge technology and where is it heading?

Whilst the Cloud will continue to remain a cornerstone of virtual computing power, with Fog computing looking to ease so...

Abstract network visualisation background
Cyber Security

The APT Series Part 2 ‘APT33’

Seeing an attacker enables you to defend against them, a way to effect this is to lay over the physical network and its ...

Abstract network visualisation background

Resources Hub

The latest industry news, threats, advice and information from our network and cyber security specialists.