RESOURCES

Company News

Cyber Security

This Week in Cyber 01st September 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 29th July 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 18th August 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 11th August 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 04 August 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 28th July 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 21st July 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Cyber Security

The Most Important Cyber Security Trends in 2023 and Beyond | Advances in Threats and Tech

In today's fast-paced digital world, cyber security is more important than ever before. As technology continues to advan...

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 14th July 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Cyber Security

This Week in Cyber 07th July 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 30th June 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 23rd June 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Cyber Security

Understanding the Risks of Supply Chain Cyber Attacks

As businesses become increasingly reliant on technology, the potential for cyber attacks on supply chains continues to r...

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 16th June 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 09th June 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 02nd June 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 26th May 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 19th May 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 12th May 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 5th May 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 28th April 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Cyber Security

Artificial Intelligence: A Friend or Foe for Cyber Security?

As the use of AI and the speed of its development rapidly increases, we investigate its impact on cyber security.

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 21st April 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Managed Detection and Response

Cloud-Based Cyber Security: Understanding the Shared Responsibility Model

The allocation of cyber security responsibility between cloud vendors and their customers is commonly misunderstood. We ...

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 14th April 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 6th April 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 31st March 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 24th March 2023

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 17th March 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 10th March 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 3rd March 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 24th February 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 17th February 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 10th February 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 3rd February 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Cyber Security

Cyber Security Challenges in Education

The education sector has always been highly targeted by cyber criminals, we take a look at some of the challenges faced ...

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 27th January 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 20th January 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 13th January 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Cyber Security

Vulnerability Assessments & Threat Hunting – Why you should be combining the two

Combining vulnerability assessments and pro-active threat hunting can help to identify weaknesses and deep dive into you...

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 6th January 2023

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 30th December 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 16th December 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 9th December 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 6th December 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 25th November 2022

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 17th November 2022

Latest news and views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 11th November 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 4th November 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 28st October 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 21st October 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 14th October 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 7th October 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 29 September 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 23rd September 2022

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 16 September 2022

This week's news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 9th September

This week's news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 2nd September

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 27th August

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 19th August

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Weekly Cyber Reports

This Week in Cyber 12th August

Latest news & views from our Cyber Analysts

telesoft-abstract-49
Press

Telesoft announces a 24/7 UK Based Managed Detection and Response Solution

Telesoft announces its latest state-of-the-art security offering - a 24/7, UK-based Managed Detection and Response (MDR)...

telesoft-abstract-49
Managed Detection and Response

How to Detect Emerging Threats on your Network?

In December 2021, a new remote access trojan (RAT) was discovered and investigated by cyber security firm Intezer. SysJo...

telesoft-abstract-49
Managed Detection and Response

The value of analysing metadata for threat hunting

Metadata within network communications relates to information such as the IP addresses from which the communication was ...

telesoft-abstract-49
Managed Detection and Response

There is no 'one size fits all' when it comes to protecting your network

Data rates are increasing day by day. Threat actors are constantly evolving their Tactics, Techniques and Procedures (TT...

telesoft-abstract-49
Cyber Security

Insecure Enterprise Networks: The cost of data breaches vs the cost of network security for businesses

In July 2020, CWT global paid out $4.5 million as a consequence of one of the most expensive ransomware attacks of all t...

telesoft-abstract-49
TDAC

Brochure: TDAC Enterprise

TDAC Enterprise is the all-in-one, virtualised software solution providing analysts with full network visibility and thr...

telesoft-abstract-49
TDAC

Brochure: TDAC Platform

Scalable network visibility and threat protection.

telesoft-abstract-49
Press

Compare the Cloud: ‘Is cloud really less of a security risk than on-premise?'

According to a recent report, three in five security professionals believe the risk of a security breach is the same or ...

telesoft-abstract-49
Press

Total Telecom: Deeper Network Visibility: The Must-Have Ammunition for CSPs

Deeper Network Visibility: The Must-Have Ammunition for CSPs and Organisations in the Ongoing Cyber War

telesoft-abstract-49
Press

IT Pro Portal: The future of Telecom Security

UK homegrown solutions are vital for securing critical national infrastructure.

telesoft-abstract-49
Press

Telecoms: The role of OpenRAN in securing 5G networks and the IoT

Telecoms.com periodically invites expert third parties to share their views on the industry’s most pressing issues. In t...

telesoft-abstract-49
Press

The impact of acquisitions on security technology

Recent years have seen an increase in the size and scale of deals happening in cyber security. In 2019, TD Ameritrade's ...

telesoft-abstract-49
Press

The Times: What’s holding the 5G rollout back?

A multitude of challenges, some old and some new, stand in the way of the mass acceptance and adoption of 5G.

telesoft-abstract-49
Press

Forbes: Meet The New Anonymous

Delivering the opening keynote at the virtual Okta Disclosure 2020 security conference on September 3, well-respected cy...

telesoft-abstract-49
Press

IT Pro Portal: Masking cyberattacks through Covid

In the age of Covid-19, businesses must prioritise safeguarding data.

telesoft-abstract-49
Press

Digtialisation World: Strapping an engine onto a fishing boat

Cybersecurity is no longer a novelty.

telesoft-abstract-49
Press

Why CTOs should care about how maths is being taught in schools

Martin Rudd, CTO of Telesoft Technologies, discusses why CTOs must bear in mind how maths is being taught in schools

telesoft-abstract-49
Press

Help Net Security: TLS 1.3: slow adoption of stronger web encryption is empowering the bad guys

For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots take...

telesoft-abstract-49
Press

Verdict Interview: Martin Rudd CTO

Martin Rudd is the CTO of Telesoft, a UK-headquartered cybersecurity agency that specialises in protecting high volume t...

telesoft-abstract-49
Press

FinTech Magazine: The changing profile of cybersecurity decision makers

Martin Rudd, CTO, Telesoft Technologies, explores the changing profile of cybersecurity decision makers in his latest ex...

telesoft-abstract-49
Press

ITProPortal: One for all or all for one?

Tech companies acquiring cybersecurity startups means lifechanging amounts of money but does this stop the technology fr...

telesoft-abstract-49
Press

Information Age: Australian Privacy Bill

ustralia’s new data protection law, Consumer Data Right (CDR), came into force last month. What does it mean for consume...

telesoft-abstract-49
Datasheets

ARNE-IVR Datasheet

Download the ARNE-IVR datasheet.

telesoft-abstract-49
Datasheets

vARNE-IVR Datasheet

Download the vARNE-IVR datasheet.

telesoft-abstract-49
Datasheets

TDAPI-SIGTRAN Datasheet

Download the TDAPI-SIGTRAN datasheet.

telesoft-abstract-49
Datasheets

vOKEFORD Datasheet

Download the vOKEFORD-Datasheet datasheet.

telesoft-abstract-49
Datasheets

OKEFORD-5500 Datasheet

Download the OKEFORD-5500 datasheet.

telesoft-abstract-49
Datasheets

MPAC-3240-45 Datasheet

Download the MPAC-3240-45 datasheet.

telesoft-abstract-49
Datasheets

MPAC-3250 Datasheet

Download the MPAC-3250 datasheet.

telesoft-abstract-49
Datasheets

vARNE Datasheet

Download the vARNE datasheet.

telesoft-abstract-49
Datasheets

ARNE Datasheet

Download the ARNE datasheet.

telesoft-abstract-49
Datasheets

TDAC Datasheet

Download the TDAC datasheet.

telesoft-abstract-49
Datasheets

CERNE Datasheet

Download the CERNE datasheet.

telesoft-abstract-49
Datasheets

Flowprobe Datasheet

Download the Flowprobe datasheet.

telesoft-abstract-49
Cyber Security

IoT New Regulations

International Data Corporation (IDC) estimates that by 2025, there will be 41.6 billion connected IoT devices. However, ...

telesoft-abstract-49
Managed Detection and Response

The Benefits of a Managed Threat Hunting Service

By using an outsourced managed threat hunting service, companies can reduce hiring costs while improving the quality of ...

telesoft-abstract-49
Cyber Security

What does the lack of IoT security mean for 5G?

The Internet of Things (IoT) has surged in popularity in recent years, with consumers embracing interconnected technolog...

telesoft-abstract-49
Cyber Security

Securing Mobile Networks

Legacy telecommunications protocols have stood the test of time, underpinning the foundations of our day-to-day communic...

telesoft-abstract-49
Quarterly Reports

2021 Q3 Operational Threat Report

Cybersecurity attacks have continued to develop over the previous quarter in both the number of attacks and the complexi...

telesoft-abstract-49
Cyber Security

Active and Passive methods of identifying encrypted traffic

With the recent shift toward remote working there has been a significant increase in network activity across the public ...

telesoft-abstract-49
Press

Telesoft achieve full 1Tbps duplex line rate within 1U

Following recent partnership with Intel, Telesoft’s Research and Development division have been exploring the latest Int...

telesoft-abstract-49
Managed Detection and Response

Proactive Threat Hunting

Telesoft’s TDAC provides security and network operations teams with a threat hunting tool that enables them to query and...

telesoft-abstract-49
Managed Detection and Response

Threat Hunting and Network Monitoring with NetFlow at Scale

Over the past year the security industry has seen a change in the threat landscape. Attacks are being targeted more towa...

telesoft-abstract-49
Quarterly Reports

2021 Q2 Operational Threat Report

As anticipated, Q2 2021 has continued to see cyber-attacks dominating headlines with several high-profile ransomware att...

telesoft-abstract-49
Company News

The benefits of UK-based cyber and communications technology manufacturing

The need for responsive, high quality telecom equipment suppliers has never been greater in the UK. Telesoft is committ...

telesoft-abstract-49
Managed Detection and Response

What is threat hunting and how does it benefit telecoms companies?

Threat hunting is the term used for proactively searching for cyber threats that could be present undetected within a ne...

telesoft-abstract-49
Quarterly Reports

2021 Q1 Operational Threat Report

‘As we waved goodbye to 2020 and embraced 2021 as the year where restrictions begin to be lifted and life can hope to em...

telesoft-abstract-49
Cyber Security

Ransomware Attacks, Trends and How to Protect Against It

Ransomware is the name for a type of malware cybercriminals use to block access to a computer system, files or data, dem...

telesoft-abstract-49
Cyber Security

Telesoft 2021 Threat Intelligence Webinar

On 21st April 2021, as we discussed and reviewed the cyber threat landscape and recent cyber attacks that have hit headl...

telesoft-abstract-49
Cyber Security

The growing importance of automated threat management

A defining feature of today’s cyberattacks is the way they unfold at such a speed that even minutes after one has been i...

telesoft-abstract-49
Cyber Security

Understanding the botnet threat

Botnets have been part of the threat scene for so long that it’s easy to underestimate how central these networks have b...

telesoft-abstract-49
Cyber Security

The looming threat of DDoS attacks in a 5G world

The rollout of fifth-generation (5G) wireless networking was supposed to be an engineering walkover, but so far, it’s be...

telesoft-abstract-49
Company News

Telesoft joins forces with Ventel to expand US market

London, UK – 24th February 2021: Telesoft Technologies are pleased to announce a new partnership with US communications ...

telesoft-abstract-49
Whitepapers

Whitepaper: Swimming with Sharks: The existential threat of a cyber attack

Recent corporate history provides plenty of examples of cyber attacks, targeting both private and public bodies.

telesoft-abstract-49
Whitepapers

Whitepaper: Flowprobe TBPS Threat Visibility

There are many challenges faced when operating at CSP or internet backbone level. Traffic flowing across key data routes...

telesoft-abstract-49
Cyber Security

Infographic: The cyber security visibility puzzle

APT groups are constantly seeking new targets and evaluating opportunities for data espionage, sabotage, and theft. One ...

telesoft-abstract-49
Cyber Security

Infographic: The scale of network defence

Networks come in different shapes and sizes and they require radically different methods to monitor and secure them. But...

telesoft-abstract-49
Whitepapers

Whitepaper: CERNE IDS Backbone Threat Detection

With an ever increasing demand of IoT devices, there is an increasing opportunity for vulnerabilities to be exploited by...

telesoft-abstract-49
Company News

Telesoft granted Ofcom Radio License for Innovation and Research

Telesoft Technologies are pleased to announce that we have been granted an Ofcom radio license for innovation and resear...

telesoft-abstract-49
Whitepapers

Whitepaper: FritzFrog P2P Botnet Fileless Malware

The number of organisations adapting to working from home has seen a significant increase in recent times. This has led ...

telesoft-abstract-49
Cyber Security

Deep visibility is the ultimate network view

Today’s Communications Service Providers (CSPs) face mounting pressure to understand the traffic passing across their ne...

telesoft-abstract-49
Cyber Security

Cybersecurity trends 2021: Encryption wars, double extortion and BGP hijacks

Predicting cybersecurity trends for the year ahead isn’t usually difficult – simply extrapolate from the current possibi...

telesoft-abstract-49
Cyber Security

Battling an APT cyber attack is a game of ‘see, protect, defend’

It’s not a question many security companies can answer because few have the capability to model something as complex as ...

telesoft-abstract-49
Cyber Security

Infographic: Detecting Advanced Persistent Threats with the Telesoft Cyber Platform

An Advanced Persistent Threat (APT) is a prolonged, sustained attack delivered by skilled users using sophisticated and ...

telesoft-abstract-49
Cyber Security

Spotting cyber attackers with encrypted traffic analysis

Cybersecurity wisdom says that network traffic should be encrypted to protect against eavesdropping and man-in-the-middl...

telesoft-abstract-49
Cyber Security

Navigating the US China Tech Cold War

What should rank as the top of the cyber security challenge for 2021? The increasingly bitter tech cold war between the ...

telesoft-abstract-49
Cyber Security

Are K-pop stans the new “anonymous”?

Since the arrest of high-profile anonymous members in the early 201s, online activism diminished somewhat. But “hacktivi...

telesoft-abstract-49
Press

The Future of 5G – Overcoming the hurdles of 5G rollout

Today The Times newspaper has featured a 20-page report on the ‘Future of 5G’ bringing together leading experts from acr...

telesoft-abstract-49
Cyber Security

Spotting rogue TLS connections with JA3 fingerprinting

It’s impossible to imagine modern networks without the security and privacy provided by Transport Layer Security (TLS) e...

telesoft-abstract-49
Cyber Security

What can you learn from a Telesoft demo?

Spotting malicious connections or ‘flows’ in the background noise of legitimate traffic is the cybersecurity equivalent ...

telesoft-abstract-49
Company News

CVE 2020-1350 Analysis of Windows DNS Server RCE Vulnerability

A customer recently came to Telesoft to request further visibility of their DNS traffic to help them detect attackers tr...

telesoft-abstract-49
Whitepapers

Whitepaper: Network visibility for multi 100Gbps networks

Data throughput on network backbones and at the border of ultra-scale data centers is constantly rising, to well above t...

telesoft-abstract-49
Company News

What is an FPGA?

It’s transceivers, DSP slices, LUTs, I/O registers, hard IP. What does the compiler do? It does syntax checks, elabora...

telesoft-abstract-49
Press

Strapping an engine onto a rowboat: changing the perception of security technology

We’re at a point now where most businesses are aware that cyberthreats exist. Every day, headlines are full of stories r...

telesoft-abstract-49
Cyber Security

Cybersecurity predictions 2020

We caught up with our CTO, Martin Rudd to find out his cybersecurity predictions for 2020. Covering IoT, security, data ...

telesoft-abstract-49
Cyber Security

JA3 Fingerprinting: Encrypted Threat Detection

As our dependence on interconnected technologies grows so does the risk of our personal data getting into the hands of m...

telesoft-abstract-49
Cyber Security

Detecting and Mitigating an Application Layer HTTP Flood DDoS Attack

Cybercriminals are increasingly using application layer Distributed Denial of Service (DDoS) to attack their victims. Un...

telesoft-abstract-49
Cyber Security

Preparing for Cyber Warfare: Strengthen your NetSecOps with nation-scale attack simulation

The cyber landscape continues to be a challenging place for public and private organisations alike. Both are often on th...

telesoft-abstract-49
Cyber Security

SecOps: What is it and why is it essential for your business?

Cybercrime brings significant costs to organisations in both taking proactive steps to prevent attacks and the reactive ...

telesoft-abstract-49
Cyber Security

Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)

Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the ...

telesoft-abstract-49
Telecoms

Uncovering Malware in Hyper-scale DNS Traffic

Cyber criminals have been using DNS for malicious purposes successfully for years, malware such as DNSChanger uses DNS ...

telesoft-abstract-49
Company News

Improving Enterprise Network Operational Efficiency

Despite a recent trend towards organisations outsourcing network security to third party management companies, a recent ...

telesoft-abstract-49

Detecting and Preventing Data Exfiltration

Data exfiltration is a form of security breach that occurs when an organisation’s data is copied, transferred or retriev...

telesoft-abstract-49

Counting the cost of DDoS attacks

A Distributed Denial-of-Service DDoS attack occurs when high rate machine-generated traffic, usually from compromised sy...

telesoft-abstract-49
Cyber Security

SSL Based Cyber-attacks Increase by 400% Over the Last Year

A new report found that last year there had been a 400% increase in SSL-based phishing threats, criminals are increasing...

telesoft-abstract-49

Is it important to differentiate between flows and conversations?

There are many moving parts to a successful network security strategy, everything that makes a network a network such as...

telesoft-abstract-49
Cyber Security

Network Visibility in the 100/25GbE High Density Data Centre Era

As the demand for bandwidth continues to grow, the migration from 100G to 400G will be the next developmental step in da...

telesoft-abstract-49

Securing Both North & South and East & West Datacentre Traffic

Generally speaking, “East-West” (EW) traffic refers to server to server traffic within a datacentre and “North-South” (N...

telesoft-abstract-49
Cyber Security

Breaking Down DDoS UDP Flood Attacks

A UDP flood is a type of volume-based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Data...

telesoft-abstract-49
Telecoms

NFV Series – Network Function Virtualisation (NFV), a disruption to the status quo

Stringent standards for protocol adherence and stability meant development of these hardware devices was slow but despit...

telesoft-abstract-49
Cyber Security

Cyber Threat Visibility: Which threats should defenders be looking for?

A network security team can only fight what they can see, an organisation’s network security depends on their ability to...

telesoft-abstract-49
Telecoms

Successful Implementation of the Telesoft OKEFORD 5500 Media Platform

We recently completed a large migration project for one of our market leading legacy products the OKEFORD 2450 IVR, work...

telesoft-abstract-49
Cyber Security

Cyber Intelligence for Shipping assets

ENISA produced its first EU-report on Maritime Cyber Security back in 2011, warning of the low cyber security awareness ...

telesoft-abstract-49
Cyber Security

FaceApp – a big data security threat or just smoke?

FaceApp has officially gone viral and while many people are enjoying seeing how they would look when they are older, man...

telesoft-abstract-49
Cyber Security

From Soldier to Cyber Intelligence & Security

A career in the military ends for everyone, eventually. It may be after a few years, it may be on completion of an exten...

telesoft-abstract-49
Cyber Security

DDoS Attack Vectors Evolve as Overall Number of Attacks Declines

In terms of DDoS attacks, 2019 has started with a bang! At the end of January reports surfaced of a massive DDoS attack ...

telesoft-abstract-49
Managed Detection and Response

What is Multi-layered Threat Detection and Mitigation?

The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by w...

telesoft-abstract-49

The rise of the botnet

Over the previous several years, the steady growth of IoT and connected devices has resulted in botnet attacks growing i...

telesoft-abstract-49
Cyber Security

Protecting a Content Delivery Network (CDN) from cyber attacks

A Content Delivery Network or CDN is a system of distributed servers and nodes that delivers web content to a user, base...

telesoft-abstract-49
Cyber Security

Data generation is increasing, so too should data storage

Big data security threats are nothing new. We continue to see conversations and articles surrounding IoT, Edge computing...

telesoft-abstract-49
Cyber Security

ICS networks: how secure are they?

A major topic discussed at BlackHat 2019 was the vulnerability and attack vectors exposed in Industrial networks, which ...

telesoft-abstract-49

Are you using Event Driven Security Automation?

Everyone in the infosec community will agree that Intrusion Detection Systems (IDS) are an important component in any ef...

telesoft-abstract-49

New Lloyds report outlines the impacts of a global ransomware attack

The report explores and analyses the risks, costs and damage that would be caused by a coordinated global ransomware att...

telesoft-abstract-49

The APT Series Part 1: What is an Advanced Persistent Threat?

APT groups are an enduring threat to every nation-state across the world, their patterns of life and attack behavior are...

telesoft-abstract-49

Pioneering Women of Information Security: Dorothy Denning and Rebecca Bace

As we celebrate International Women’s Day, we have chosen to honour two women who were vital to the design and developme...

telesoft-abstract-49
Managed Detection and Response

Utilising Contextual Threat Record in an Intrusion Detection System (IDS)

Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams ...

telesoft-abstract-49
Managed Detection and Response

SSL certificate extraction

To continue expanding the current 2x100G FlowProbe functionally, SSL Certificate extraction has been added to the layer ...

telesoft-abstract-49
Cyber Security

5 metadata use cases every CISO should know about

If you enter “‘Big Data definition” in to any search engine, you will get the following result ‘extremely large data set...

telesoft-abstract-49
Telecoms

NFV Series: Network Function Virtualisation, maximising your potential

The obvious advantages of an NFV network architecture are reduced capital expenditure (CAPEX) and operating expenditure ...

telesoft-abstract-49
Cyber Security

Packet De-duplication Techniques at Carrier Scale

The definition of packet duplication is pretty simple; a duplicate packet is any packet that is identical to another pac...

telesoft-abstract-49
Telecoms

Security Hardening for Cyber Appliances

When protecting carrier scale infrastructure there are a number of good practices and steps to follow to ensure the cont...

telesoft-abstract-49

Discover More: Maximising the value of Flow Data for the SOC

Security analytics and network visibility tools used by defenders collect as much useful data as possible to improve ano...

telesoft-abstract-49
Cyber Security

The Evolution of NFV Network Visibility and Security at Scale

NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructu...

telesoft-abstract-49
Telecoms

Monitoring Tunnelled Protocols in hyper-scale Telco networks

Telecommunications providers are migrating data backbones to 100GbE to carry increasing traffic volume shared between mu...

telesoft-abstract-49
Cyber Security

Part 2 : What is driving the growth of Edge technology and where is it heading?

Whilst the Cloud will continue to remain a cornerstone of virtual computing power, with Fog computing looking to ease so...

telesoft-abstract-49
Managed Detection and Response

Sustainable Smart Cities in the Sand

The idea of sustainable smart cities can be a true driving force to social and economic growth and happiness. Giving a c...

telesoft-abstract-49
Cyber Security

Part 1 : Edge Computing IoT & the scalability of virtual infrastructure

The Edge is starting to disappear from view, slowly being covered by the Fog – metaphorically at least! Whilst Edge com...

telesoft-abstract-49
Cyber Security

Part 3 : The Cutting Edge of Smart Cities

The cutting Edge of Smart Cities Edge computing and fog technologies continue to advance as the technology industry con...

telesoft-abstract-49
Cyber Security

What do you mean we are flying blind?

The drive towards the use of cloud computing, cloud platforms and cloud data storage within most industries has been pro...

telesoft-abstract-49

The APT Series: APT Attack Process Infographic

To wrap up our three part APT blog series we have created ​an infographic which shows the five stages of an APT attack, ...

telesoft-abstract-49
Cyber Security

The APT Series Part 2 ‘APT33’

Seeing an attacker enables you to defend against them, a way to effect this is to lay over the physical network and its ...

telesoft-abstract-49
Cyber Security

5 Actionable Steps You Can Take To Prevent a Cyber Attack

As we approach 2020, cyber-attacks have become more and more prominent, with major headlines such as “Company Z announce...

telesoft-abstract-49
Cyber Security

The APT Series Part 3: The Future of Advanced Persistent Threat Groups

Whilst there are many more scenarios to be considered regarding the future of APT groups, the above suggests that it is ...

telesoft-abstract-49
Cyber Security

Social engineering explained. What is it and how can you protect yourself from an attack?

It is important to approach social engineering holistically and try to increase overall awareness for everyone, as perso...

telesoft-abstract-49

Oversight of UK’s Critical National Infrastructure – Chinese Vendors

In an industry awash with marketing hype, Critical National Infrastructure is, for once, an appropriate name – infrastru...

telesoft-abstract-49
Company News

Women in tech: reducing the gender gap in the technology industry

According to a recent PwC report only 15% of people working in STEM roles in the UK are female. In their infographic, Pw...

telesoft-abstract-49
Cyber Security

PHISHING VS SPEAR PHISHING: WHAT ARE THEY AND HOW CAN YOU AVOID THEM?

User error is human, therefore as long as humans remain the ultimate end user in a network, social engineering attacks s...

telesoft-abstract-49
Press

Apprentice Named Cybersecurity Student of the Year

We are really proud to announce that our digital and technology solutions apprentice, Elliott Simmonds, has been named C...

telesoft-abstract-49

Resources Hub

The latest industry news, threats, advice and information from our network and cyber security specialists.

Telesoft use cookies to improve your browsing experience.