RESOURCES
Managed Detection and Response
Managed Detection and Response
Cloud-Based Cyber Security: Understanding the Shared Responsibility Model
The allocation of cyber security responsibility between cloud vendors and their customers is commonly misunderstood. We ...
Managed Detection and Response
How to Detect Emerging Threats on your Network?
In December 2021, a new remote access trojan (RAT) was discovered and investigated by cyber security firm Intezer. SysJo...
Managed Detection and Response
The value of analysing metadata for threat hunting
Metadata within network communications relates to information such as the IP addresses from which the communication was ...
Managed Detection and Response
There is no 'one size fits all' when it comes to protecting your network
Data rates are increasing day by day. Threat actors are constantly evolving their Tactics, Techniques and Procedures (TT...
Managed Detection and Response
The Benefits of a Managed Threat Hunting Service
By using an outsourced managed threat hunting service, companies can reduce hiring costs while improving the quality of ...
Managed Detection and Response
What is Multi-layered Threat Detection and Mitigation?
The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by w...
Managed Detection and Response
Proactive Threat Hunting
Telesoft’s TDAC provides security and network operations teams with a threat hunting tool that enables them to query and...
Managed Detection and Response
Threat Hunting and Network Monitoring with NetFlow at Scale
Over the past year the security industry has seen a change in the threat landscape. Attacks are being targeted more towa...
Managed Detection and Response
What is threat hunting and how does it benefit telecoms companies?
Threat hunting is the term used for proactively searching for cyber threats that could be present undetected within a ne...
Managed Detection and Response
SSL certificate extraction
To continue expanding the current 2x100G FlowProbe functionally, SSL Certificate extraction has been added to the layer ...
Managed Detection and Response
Utilising Contextual Threat Record in an Intrusion Detection System (IDS)
Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams ...
Managed Detection and Response
Sustainable Smart Cities in the Sand
The idea of sustainable smart cities can be a true driving force to social and economic growth and happiness. Giving a c...
Resources Hub
The latest industry news, threats, advice and information from our network and cyber security specialists.