RESOURCES

Threat Hunting

Threat Hunting

The value of analysing metadata for threat hunting

Metadata within network communications relates to information such as the IP addresses from which the communication was ...

Metadata
Threat Hunting

Weekly Cyber Threat Reports

Stay up to date with the latest cyber threats and attacks with our weekly threat report.

Weekly Threat Report
Threat Hunting

There is no 'one size fits all' when it comes to protecting your network

Data rates are increasing day by day. Threat actors are constantly evolving their Tactics, Techniques and Procedures (TT...

Threat Hunting Service
Threat Hunting

The Benefits of a Managed Threat Hunting Service

By using an outsourced managed threat hunting service, companies can reduce hiring costs while improving the quality of ...

About Placeholder
Threat Hunting

What is Multi-layered Threat Detection and Mitigation?

The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by w...

Abstract network visualisation background
Threat Hunting

Proactive Threat Hunting

Telesoft’s TDAC provides security and network operations teams with a threat hunting tool that enables them to query and...

Abstract meandering cube wall black and white
Threat Hunting

Threat Hunting and Network Monitoring with NetFlow at Scale

Over the past year the security industry has seen a change in the threat landscape. Attacks are being targeted more towa...

Abstract network visualisation background
Threat Hunting

What is threat hunting and how does it benefit telecoms companies?

Threat hunting is the term used for proactively searching for cyber threats that could be present undetected within a ne...

Abstract network visualisation background
Threat Hunting

SSL certificate extraction

To continue expanding the current 2x100G FlowProbe functionally, SSL Certificate extraction has been added to the layer ...

Abstract network visualisation background
Threat Hunting

Utilising Contextual Threat Record in an Intrusion Detection System (IDS)

Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams ...

Abstract network visualisation background
Threat Hunting

Sustainable Smart Cities in the Sand

The idea of sustainable smart cities can be a true driving force to social and economic growth and happiness. Giving a c...

Abstract network visualisation background

Nucleus: Repository of cyber security information

The latest industry news, threats, advice and information from our network and cyber security specialists.

Telesoft use cookies to improve your browsing experience.