RESOURCES

Managed Detection and Response

Managed Detection and Response

How to Detect Emerging Threats on your Network?

In December 2021, a new remote access trojan (RAT) was discovered and investigated by cyber security firm Intezer. SysJo...

SysJoker Attack
Managed Detection and Response

The value of analysing metadata for threat hunting

Metadata within network communications relates to information such as the IP addresses from which the communication was ...

Metadata
Managed Detection and Response

There is no 'one size fits all' when it comes to protecting your network

Data rates are increasing day by day. Threat actors are constantly evolving their Tactics, Techniques and Procedures (TT...

Threat Hunting Service
Managed Detection and Response

The Benefits of a Managed Threat Hunting Service

By using an outsourced managed threat hunting service, companies can reduce hiring costs while improving the quality of ...

About Placeholder
Managed Detection and Response

What is Multi-layered Threat Detection and Mitigation?

The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by w...

Abstract network visualisation background
Managed Detection and Response

Proactive Threat Hunting

Telesoft’s TDAC provides security and network operations teams with a threat hunting tool that enables them to query and...

Abstract meandering cube wall black and white
Managed Detection and Response

Threat Hunting and Network Monitoring with NetFlow at Scale

Over the past year the security industry has seen a change in the threat landscape. Attacks are being targeted more towa...

Abstract network visualisation background
Managed Detection and Response

What is threat hunting and how does it benefit telecoms companies?

Threat hunting is the term used for proactively searching for cyber threats that could be present undetected within a ne...

Abstract network visualisation background
Managed Detection and Response

SSL certificate extraction

To continue expanding the current 2x100G FlowProbe functionally, SSL Certificate extraction has been added to the layer ...

Abstract network visualisation background
Managed Detection and Response

Utilising Contextual Threat Record in an Intrusion Detection System (IDS)

Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams ...

Abstract network visualisation background
Managed Detection and Response

Sustainable Smart Cities in the Sand

The idea of sustainable smart cities can be a true driving force to social and economic growth and happiness. Giving a c...

Abstract network visualisation background

Resources Hub

The latest industry news, threats, advice and information from our network and cyber security specialists.

Telesoft use cookies to improve your browsing experience.