The value of analysing metadata for threat hunting
Metadata within network communications relates to information such as the IP addresses from which the communication was ...
Weekly Cyber Threat Reports
Stay up to date with the latest cyber threats and attacks with our weekly threat report.
There is no 'one size fits all' when it comes to protecting your network
Data rates are increasing day by day. Threat actors are constantly evolving their Tactics, Techniques and Procedures (TT...
The Benefits of a Managed Threat Hunting Service
By using an outsourced managed threat hunting service, companies can reduce hiring costs while improving the quality of ...
What is Multi-layered Threat Detection and Mitigation?
The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by w...
Proactive Threat Hunting
Telesoft’s TDAC provides security and network operations teams with a threat hunting tool that enables them to query and...
Threat Hunting and Network Monitoring with NetFlow at Scale
Over the past year the security industry has seen a change in the threat landscape. Attacks are being targeted more towa...
What is threat hunting and how does it benefit telecoms companies?
Threat hunting is the term used for proactively searching for cyber threats that could be present undetected within a ne...
SSL certificate extraction
To continue expanding the current 2x100G FlowProbe functionally, SSL Certificate extraction has been added to the layer ...
Utilising Contextual Threat Record in an Intrusion Detection System (IDS)
Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams ...
Sustainable Smart Cities in the Sand
The idea of sustainable smart cities can be a true driving force to social and economic growth and happiness. Giving a c...
Nucleus: Repository of cyber security information
The latest industry news, threats, advice and information from our network and cyber security specialists.