RESOURCES
Press
Cyber Security
This Week in Cyber 01st September 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 29th July 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 18th August 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 11th August 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 04 August 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 28th July 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 21st July 2023
Latest news and views from our Cyber Analysts

Cyber Security
The Most Important Cyber Security Trends in 2023 and Beyond | Advances in Threats and Tech
In today's fast-paced digital world, cyber security is more important than ever before. As technology continues to advan...

Weekly Cyber Reports
This Week in Cyber 14th July 2023
Latest news and views from our Cyber Analysts

Cyber Security
This Week in Cyber 07th July 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 30th June 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 23rd June 2023
Latest news and views from our Cyber Analysts

Cyber Security
Understanding the Risks of Supply Chain Cyber Attacks
As businesses become increasingly reliant on technology, the potential for cyber attacks on supply chains continues to r...

Weekly Cyber Reports
This Week in Cyber 16th June 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 09th June 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 02nd June 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 26th May 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 19th May 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 12th May 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 5th May 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 28th April 2023
Latest news and views from our Cyber Analysts

Cyber Security
Artificial Intelligence: A Friend or Foe for Cyber Security?
As the use of AI and the speed of its development rapidly increases, we investigate its impact on cyber security.

Weekly Cyber Reports
This Week in Cyber 21st April 2023
Latest news and views from our Cyber Analysts

Managed Detection and Response
Cloud-Based Cyber Security: Understanding the Shared Responsibility Model
The allocation of cyber security responsibility between cloud vendors and their customers is commonly misunderstood. We ...

Weekly Cyber Reports
This Week in Cyber 14th April 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 6th April 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 31st March 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 24th March 2023
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 17th March 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 10th March 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 3rd March 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 24th February 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 17th February 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 10th February 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 3rd February 2023
Latest news & views from our Cyber Analysts

Cyber Security
Cyber Security Challenges in Education
The education sector has always been highly targeted by cyber criminals, we take a look at some of the challenges faced ...

Weekly Cyber Reports
This Week in Cyber 27th January 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 20th January 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 13th January 2023
Latest news & views from our Cyber Analysts

Cyber Security
Vulnerability Assessments & Threat Hunting – Why you should be combining the two
Combining vulnerability assessments and pro-active threat hunting can help to identify weaknesses and deep dive into you...

Weekly Cyber Reports
This Week in Cyber 6th January 2023
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 30th December 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 16th December 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 9th December 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 6th December 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 25th November 2022
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 17th November 2022
Latest news and views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 11th November 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 4th November 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 28st October 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 21st October 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 14th October 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 7th October 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 29 September 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 23rd September 2022
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 16 September 2022
This week's news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 9th September
This week's news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 2nd September
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 27th August
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 19th August
Latest news & views from our Cyber Analysts

Weekly Cyber Reports
This Week in Cyber 12th August
Latest news & views from our Cyber Analysts

Press
Telesoft announces a 24/7 UK Based Managed Detection and Response Solution
Telesoft announces its latest state-of-the-art security offering - a 24/7, UK-based Managed Detection and Response (MDR)...

Managed Detection and Response
How to Detect Emerging Threats on your Network?
In December 2021, a new remote access trojan (RAT) was discovered and investigated by cyber security firm Intezer. SysJo...

Managed Detection and Response
The value of analysing metadata for threat hunting
Metadata within network communications relates to information such as the IP addresses from which the communication was ...

Managed Detection and Response
There is no 'one size fits all' when it comes to protecting your network
Data rates are increasing day by day. Threat actors are constantly evolving their Tactics, Techniques and Procedures (TT...

Cyber Security
Insecure Enterprise Networks: The cost of data breaches vs the cost of network security for businesses
In July 2020, CWT global paid out $4.5 million as a consequence of one of the most expensive ransomware attacks of all t...

TDAC
Brochure: TDAC Enterprise
TDAC Enterprise is the all-in-one, virtualised software solution providing analysts with full network visibility and thr...

TDAC
Brochure: TDAC Platform
Scalable network visibility and threat protection.

Press
Compare the Cloud: ‘Is cloud really less of a security risk than on-premise?'
According to a recent report, three in five security professionals believe the risk of a security breach is the same or ...

Press
Total Telecom: Deeper Network Visibility: The Must-Have Ammunition for CSPs
Deeper Network Visibility: The Must-Have Ammunition for CSPs and Organisations in the Ongoing Cyber War

Press
IT Pro Portal: The future of Telecom Security
UK homegrown solutions are vital for securing critical national infrastructure.

Press
Telecoms: The role of OpenRAN in securing 5G networks and the IoT
Telecoms.com periodically invites expert third parties to share their views on the industry’s most pressing issues. In t...

Press
The impact of acquisitions on security technology
Recent years have seen an increase in the size and scale of deals happening in cyber security. In 2019, TD Ameritrade's ...

Press
The Times: What’s holding the 5G rollout back?
A multitude of challenges, some old and some new, stand in the way of the mass acceptance and adoption of 5G.

Press
Forbes: Meet The New Anonymous
Delivering the opening keynote at the virtual Okta Disclosure 2020 security conference on September 3, well-respected cy...

Press
IT Pro Portal: Masking cyberattacks through Covid
In the age of Covid-19, businesses must prioritise safeguarding data.

Press
Digtialisation World: Strapping an engine onto a fishing boat
Cybersecurity is no longer a novelty.

Press
Why CTOs should care about how maths is being taught in schools
Martin Rudd, CTO of Telesoft Technologies, discusses why CTOs must bear in mind how maths is being taught in schools

Press
Help Net Security: TLS 1.3: slow adoption of stronger web encryption is empowering the bad guys
For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots take...

Press
Verdict Interview: Martin Rudd CTO
Martin Rudd is the CTO of Telesoft, a UK-headquartered cybersecurity agency that specialises in protecting high volume t...

Press
FinTech Magazine: The changing profile of cybersecurity decision makers
Martin Rudd, CTO, Telesoft Technologies, explores the changing profile of cybersecurity decision makers in his latest ex...

Press
ITProPortal: One for all or all for one?
Tech companies acquiring cybersecurity startups means lifechanging amounts of money but does this stop the technology fr...

Press
Information Age: Australian Privacy Bill
ustralia’s new data protection law, Consumer Data Right (CDR), came into force last month. What does it mean for consume...

Datasheets
ARNE-IVR Datasheet
Download the ARNE-IVR datasheet.

Datasheets
vARNE-IVR Datasheet
Download the vARNE-IVR datasheet.

Datasheets
TDAPI-SIGTRAN Datasheet
Download the TDAPI-SIGTRAN datasheet.

Datasheets
vOKEFORD Datasheet
Download the vOKEFORD-Datasheet datasheet.

Datasheets
OKEFORD-5500 Datasheet
Download the OKEFORD-5500 datasheet.

Datasheets
MPAC-3240-45 Datasheet
Download the MPAC-3240-45 datasheet.

Datasheets
MPAC-3250 Datasheet
Download the MPAC-3250 datasheet.

Datasheets
vARNE Datasheet
Download the vARNE datasheet.

Datasheets
ARNE Datasheet
Download the ARNE datasheet.

Datasheets
TDAC Datasheet
Download the TDAC datasheet.

Datasheets
CERNE Datasheet
Download the CERNE datasheet.

Datasheets
Flowprobe Datasheet
Download the Flowprobe datasheet.

Cyber Security
IoT New Regulations
International Data Corporation (IDC) estimates that by 2025, there will be 41.6 billion connected IoT devices. However, ...

Managed Detection and Response
The Benefits of a Managed Threat Hunting Service
By using an outsourced managed threat hunting service, companies can reduce hiring costs while improving the quality of ...

Cyber Security
What does the lack of IoT security mean for 5G?
The Internet of Things (IoT) has surged in popularity in recent years, with consumers embracing interconnected technolog...

Cyber Security
Securing Mobile Networks
Legacy telecommunications protocols have stood the test of time, underpinning the foundations of our day-to-day communic...

Quarterly Reports
2021 Q3 Operational Threat Report
Cybersecurity attacks have continued to develop over the previous quarter in both the number of attacks and the complexi...

Cyber Security
Active and Passive methods of identifying encrypted traffic
With the recent shift toward remote working there has been a significant increase in network activity across the public ...

Press
Telesoft achieve full 1Tbps duplex line rate within 1U
Following recent partnership with Intel, Telesoft’s Research and Development division have been exploring the latest Int...

Managed Detection and Response
Proactive Threat Hunting
Telesoft’s TDAC provides security and network operations teams with a threat hunting tool that enables them to query and...

Managed Detection and Response
Threat Hunting and Network Monitoring with NetFlow at Scale
Over the past year the security industry has seen a change in the threat landscape. Attacks are being targeted more towa...

Quarterly Reports
2021 Q2 Operational Threat Report
As anticipated, Q2 2021 has continued to see cyber-attacks dominating headlines with several high-profile ransomware att...

Company News
The benefits of UK-based cyber and communications technology manufacturing
The need for responsive, high quality telecom equipment suppliers has never been greater in the UK. Telesoft is committ...

Managed Detection and Response
What is threat hunting and how does it benefit telecoms companies?
Threat hunting is the term used for proactively searching for cyber threats that could be present undetected within a ne...

Quarterly Reports
2021 Q1 Operational Threat Report
‘As we waved goodbye to 2020 and embraced 2021 as the year where restrictions begin to be lifted and life can hope to em...

Cyber Security
Ransomware Attacks, Trends and How to Protect Against It
Ransomware is the name for a type of malware cybercriminals use to block access to a computer system, files or data, dem...

Cyber Security
Telesoft 2021 Threat Intelligence Webinar
On 21st April 2021, as we discussed and reviewed the cyber threat landscape and recent cyber attacks that have hit headl...

Cyber Security
The growing importance of automated threat management
A defining feature of today’s cyberattacks is the way they unfold at such a speed that even minutes after one has been i...

Cyber Security
Understanding the botnet threat
Botnets have been part of the threat scene for so long that it’s easy to underestimate how central these networks have b...

Cyber Security
The looming threat of DDoS attacks in a 5G world
The rollout of fifth-generation (5G) wireless networking was supposed to be an engineering walkover, but so far, it’s be...

Company News
Telesoft joins forces with Ventel to expand US market
London, UK – 24th February 2021: Telesoft Technologies are pleased to announce a new partnership with US communications ...

Whitepapers
Whitepaper: Swimming with Sharks: The existential threat of a cyber attack
Recent corporate history provides plenty of examples of cyber attacks, targeting both private and public bodies.

Whitepapers
Whitepaper: Flowprobe TBPS Threat Visibility
There are many challenges faced when operating at CSP or internet backbone level. Traffic flowing across key data routes...

Cyber Security
Infographic: The cyber security visibility puzzle
APT groups are constantly seeking new targets and evaluating opportunities for data espionage, sabotage, and theft. One ...

Cyber Security
Infographic: The scale of network defence
Networks come in different shapes and sizes and they require radically different methods to monitor and secure them. But...

Whitepapers
Whitepaper: CERNE IDS Backbone Threat Detection
With an ever increasing demand of IoT devices, there is an increasing opportunity for vulnerabilities to be exploited by...

Company News
Telesoft granted Ofcom Radio License for Innovation and Research
Telesoft Technologies are pleased to announce that we have been granted an Ofcom radio license for innovation and resear...

Whitepapers
Whitepaper: FritzFrog P2P Botnet Fileless Malware
The number of organisations adapting to working from home has seen a significant increase in recent times. This has led ...

Cyber Security
Deep visibility is the ultimate network view
Today’s Communications Service Providers (CSPs) face mounting pressure to understand the traffic passing across their ne...

Cyber Security
Cybersecurity trends 2021: Encryption wars, double extortion and BGP hijacks
Predicting cybersecurity trends for the year ahead isn’t usually difficult – simply extrapolate from the current possibi...

Cyber Security
Battling an APT cyber attack is a game of ‘see, protect, defend’
It’s not a question many security companies can answer because few have the capability to model something as complex as ...

Cyber Security
Infographic: Detecting Advanced Persistent Threats with the Telesoft Cyber Platform
An Advanced Persistent Threat (APT) is a prolonged, sustained attack delivered by skilled users using sophisticated and ...

Cyber Security
Spotting cyber attackers with encrypted traffic analysis
Cybersecurity wisdom says that network traffic should be encrypted to protect against eavesdropping and man-in-the-middl...

Cyber Security
Navigating the US China Tech Cold War
What should rank as the top of the cyber security challenge for 2021? The increasingly bitter tech cold war between the ...

Cyber Security
Are K-pop stans the new “anonymous”?
Since the arrest of high-profile anonymous members in the early 201s, online activism diminished somewhat. But “hacktivi...

Press
The Future of 5G – Overcoming the hurdles of 5G rollout
Today The Times newspaper has featured a 20-page report on the ‘Future of 5G’ bringing together leading experts from acr...

Cyber Security
Spotting rogue TLS connections with JA3 fingerprinting
It’s impossible to imagine modern networks without the security and privacy provided by Transport Layer Security (TLS) e...

Cyber Security
What can you learn from a Telesoft demo?
Spotting malicious connections or ‘flows’ in the background noise of legitimate traffic is the cybersecurity equivalent ...

Company News
CVE 2020-1350 Analysis of Windows DNS Server RCE Vulnerability
A customer recently came to Telesoft to request further visibility of their DNS traffic to help them detect attackers tr...

Whitepapers
Whitepaper: Network visibility for multi 100Gbps networks
Data throughput on network backbones and at the border of ultra-scale data centers is constantly rising, to well above t...

Company News
What is an FPGA?
It’s transceivers, DSP slices, LUTs, I/O registers, hard IP. What does the compiler do? It does syntax checks, elabora...

Press
Strapping an engine onto a rowboat: changing the perception of security technology
We’re at a point now where most businesses are aware that cyberthreats exist. Every day, headlines are full of stories r...

Cyber Security
Cybersecurity predictions 2020
We caught up with our CTO, Martin Rudd to find out his cybersecurity predictions for 2020. Covering IoT, security, data ...

Cyber Security
JA3 Fingerprinting: Encrypted Threat Detection
As our dependence on interconnected technologies grows so does the risk of our personal data getting into the hands of m...

Cyber Security
Detecting and Mitigating an Application Layer HTTP Flood DDoS Attack
Cybercriminals are increasingly using application layer Distributed Denial of Service (DDoS) to attack their victims. Un...

Cyber Security
Preparing for Cyber Warfare: Strengthen your NetSecOps with nation-scale attack simulation
The cyber landscape continues to be a challenging place for public and private organisations alike. Both are often on th...

Cyber Security
SecOps: What is it and why is it essential for your business?
Cybercrime brings significant costs to organisations in both taking proactive steps to prevent attacks and the reactive ...

Cyber Security
Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)
Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the ...

Telecoms
Uncovering Malware in Hyper-scale DNS Traffic
Cyber criminals have been using DNS for malicious purposes successfully for years, malware such as DNSChanger uses DNS ...

Company News
Improving Enterprise Network Operational Efficiency
Despite a recent trend towards organisations outsourcing network security to third party management companies, a recent ...

Detecting and Preventing Data Exfiltration
Data exfiltration is a form of security breach that occurs when an organisation’s data is copied, transferred or retriev...

Counting the cost of DDoS attacks
A Distributed Denial-of-Service DDoS attack occurs when high rate machine-generated traffic, usually from compromised sy...

Cyber Security
SSL Based Cyber-attacks Increase by 400% Over the Last Year
A new report found that last year there had been a 400% increase in SSL-based phishing threats, criminals are increasing...

Is it important to differentiate between flows and conversations?
There are many moving parts to a successful network security strategy, everything that makes a network a network such as...

Cyber Security
Network Visibility in the 100/25GbE High Density Data Centre Era
As the demand for bandwidth continues to grow, the migration from 100G to 400G will be the next developmental step in da...

Securing Both North & South and East & West Datacentre Traffic
Generally speaking, “East-West” (EW) traffic refers to server to server traffic within a datacentre and “North-South” (N...

Cyber Security
Breaking Down DDoS UDP Flood Attacks
A UDP flood is a type of volume-based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Data...

Telecoms
NFV Series – Network Function Virtualisation (NFV), a disruption to the status quo
Stringent standards for protocol adherence and stability meant development of these hardware devices was slow but despit...

Cyber Security
Cyber Threat Visibility: Which threats should defenders be looking for?
A network security team can only fight what they can see, an organisation’s network security depends on their ability to...

Telecoms
Successful Implementation of the Telesoft OKEFORD 5500 Media Platform
We recently completed a large migration project for one of our market leading legacy products the OKEFORD 2450 IVR, work...

Cyber Security
Cyber Intelligence for Shipping assets
ENISA produced its first EU-report on Maritime Cyber Security back in 2011, warning of the low cyber security awareness ...

Cyber Security
FaceApp – a big data security threat or just smoke?
FaceApp has officially gone viral and while many people are enjoying seeing how they would look when they are older, man...

Cyber Security
From Soldier to Cyber Intelligence & Security
A career in the military ends for everyone, eventually. It may be after a few years, it may be on completion of an exten...

Cyber Security
DDoS Attack Vectors Evolve as Overall Number of Attacks Declines
In terms of DDoS attacks, 2019 has started with a bang! At the end of January reports surfaced of a massive DDoS attack ...

Managed Detection and Response
What is Multi-layered Threat Detection and Mitigation?
The view of the cyber threat landscape is very different depending on your perspective, this perspective is defined by w...

The rise of the botnet
Over the previous several years, the steady growth of IoT and connected devices has resulted in botnet attacks growing i...

Cyber Security
Protecting a Content Delivery Network (CDN) from cyber attacks
A Content Delivery Network or CDN is a system of distributed servers and nodes that delivers web content to a user, base...

Cyber Security
Data generation is increasing, so too should data storage
Big data security threats are nothing new. We continue to see conversations and articles surrounding IoT, Edge computing...

Cyber Security
ICS networks: how secure are they?
A major topic discussed at BlackHat 2019 was the vulnerability and attack vectors exposed in Industrial networks, which ...

Are you using Event Driven Security Automation?
Everyone in the infosec community will agree that Intrusion Detection Systems (IDS) are an important component in any ef...

New Lloyds report outlines the impacts of a global ransomware attack
The report explores and analyses the risks, costs and damage that would be caused by a coordinated global ransomware att...

The APT Series Part 1: What is an Advanced Persistent Threat?
APT groups are an enduring threat to every nation-state across the world, their patterns of life and attack behavior are...

Pioneering Women of Information Security: Dorothy Denning and Rebecca Bace
As we celebrate International Women’s Day, we have chosen to honour two women who were vital to the design and developme...

Managed Detection and Response
Utilising Contextual Threat Record in an Intrusion Detection System (IDS)
Security Analysts within the SecOps, DevOps, Security Operations Centre (SOC), Incident Response and Threat Intel teams ...

Managed Detection and Response
SSL certificate extraction
To continue expanding the current 2x100G FlowProbe functionally, SSL Certificate extraction has been added to the layer ...

Cyber Security
5 metadata use cases every CISO should know about
If you enter “‘Big Data definition” in to any search engine, you will get the following result ‘extremely large data set...

Telecoms
NFV Series: Network Function Virtualisation, maximising your potential
The obvious advantages of an NFV network architecture are reduced capital expenditure (CAPEX) and operating expenditure ...

Cyber Security
Packet De-duplication Techniques at Carrier Scale
The definition of packet duplication is pretty simple; a duplicate packet is any packet that is identical to another pac...

Telecoms
Security Hardening for Cyber Appliances
When protecting carrier scale infrastructure there are a number of good practices and steps to follow to ensure the cont...

Discover More: Maximising the value of Flow Data for the SOC
Security analytics and network visibility tools used by defenders collect as much useful data as possible to improve ano...

Cyber Security
The Evolution of NFV Network Visibility and Security at Scale
NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructu...

Telecoms
Monitoring Tunnelled Protocols in hyper-scale Telco networks
Telecommunications providers are migrating data backbones to 100GbE to carry increasing traffic volume shared between mu...

Cyber Security
Part 2 : What is driving the growth of Edge technology and where is it heading?
Whilst the Cloud will continue to remain a cornerstone of virtual computing power, with Fog computing looking to ease so...

Managed Detection and Response
Sustainable Smart Cities in the Sand
The idea of sustainable smart cities can be a true driving force to social and economic growth and happiness. Giving a c...

Cyber Security
Part 1 : Edge Computing IoT & the scalability of virtual infrastructure
The Edge is starting to disappear from view, slowly being covered by the Fog – metaphorically at least! Whilst Edge com...

Cyber Security
Part 3 : The Cutting Edge of Smart Cities
The cutting Edge of Smart Cities Edge computing and fog technologies continue to advance as the technology industry con...

Cyber Security
What do you mean we are flying blind?
The drive towards the use of cloud computing, cloud platforms and cloud data storage within most industries has been pro...

The APT Series: APT Attack Process Infographic
To wrap up our three part APT blog series we have created an infographic which shows the five stages of an APT attack, ...

Cyber Security
The APT Series Part 2 ‘APT33’
Seeing an attacker enables you to defend against them, a way to effect this is to lay over the physical network and its ...

Cyber Security
5 Actionable Steps You Can Take To Prevent a Cyber Attack
As we approach 2020, cyber-attacks have become more and more prominent, with major headlines such as “Company Z announce...

Cyber Security
The APT Series Part 3: The Future of Advanced Persistent Threat Groups
Whilst there are many more scenarios to be considered regarding the future of APT groups, the above suggests that it is ...

Cyber Security
Social engineering explained. What is it and how can you protect yourself from an attack?
It is important to approach social engineering holistically and try to increase overall awareness for everyone, as perso...

Oversight of UK’s Critical National Infrastructure – Chinese Vendors
In an industry awash with marketing hype, Critical National Infrastructure is, for once, an appropriate name – infrastru...

Company News
Women in tech: reducing the gender gap in the technology industry
According to a recent PwC report only 15% of people working in STEM roles in the UK are female. In their infographic, Pw...

Cyber Security
PHISHING VS SPEAR PHISHING: WHAT ARE THEY AND HOW CAN YOU AVOID THEM?
User error is human, therefore as long as humans remain the ultimate end user in a network, social engineering attacks s...

Press
Apprentice Named Cybersecurity Student of the Year
We are really proud to announce that our digital and technology solutions apprentice, Elliott Simmonds, has been named C...


Resources Hub
The latest industry news, threats, advice and information from our network and cyber security specialists.