RESOURCES

Managed SOC Service

Managed SOC Service

What is a Managed SOC Service?

In today's digital age, cyber security threats are becoming increasingly sophisticated and frequent. From ransomware att...

SOC 3
Managed SOC Service

Cloud-Based Cyber Security: Understanding the Shared Responsibility Model

The allocation of cyber security responsibility between cloud vendors and their customers is commonly misunderstood. We ...

Cloud Vendors
Managed SOC Service

How to Detect Emerging Threats on your Network?

In December 2021, a new remote access trojan (RAT) was discovered and investigated by cyber security firm Intezer. SysJo...

SysJoker Attack
Managed SOC Service

The value of analysing metadata for threat hunting

Metadata within network communications relates to information such as the IP addresses from which the communication was ...

Metadata
Managed SOC Service

There is no 'one size fits all' when it comes to protecting your network

Data rates are increasing day by day. Threat actors are constantly evolving their Tactics, Techniques and Procedures (TT...

Threat Hunting Service
Managed SOC Service

The Benefits of a Managed Threat Hunting Service

By using an outsourced managed threat hunting service, companies can reduce hiring costs while improving the quality of ...

About Placeholder
Managed SOC Service

What is Multi-layered Threat Detection and Mitigation?

The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by w...

Abstract network visualisation background
Managed SOC Service

Proactive Threat Hunting

Telesoft’s TDAC provides security and network operations teams with a threat hunting tool that enables them to query and...

Abstract meandering cube wall black and white
Managed SOC Service

Threat Hunting and Network Monitoring with NetFlow at Scale

Over the past year the security industry has seen a change in the threat landscape. Attacks are being targeted more towa...

cdn
Managed SOC Service

What is threat hunting and how does it benefit telecoms companies?

Threat hunting is the term used for proactively searching for cyber threats that could be present undetected within a ne...

Abstract network visualisation background
Managed SOC Service

SSL certificate extraction

To continue expanding the current 2x100G FlowProbe functionally, SSL Certificate extraction has been added to the layer ...

Abstract network visualisation background
Managed SOC Service

Utilising Contextual Threat Record in an Intrusion Detection System (IDS)

Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams ...

Abstract network visualisation background
Managed SOC Service

Sustainable Smart Cities in the Sand

The idea of sustainable smart cities can be a true driving force to social and economic growth and happiness. Giving a c...

Abstract network visualisation background

Resources Hub

The latest industry news, threats, advice and information from our network and cyber security specialists.