Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Networks News

Telnet Networks News - We'll keep you up to date with what's happening in the industry.

Deploying Inline Security Tools

Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go about that though? There are so many schools of thought, methods, and configurations. Here are just a few examples: Cyber range trainingCyber resilienceDefense in depthEncryptionEndpoint securityFirewallsInli...

Continue reading
  13022 Hits

Network Security Works Only If You See The Right Traffic

Security is nowadays an important part of network management. Secure networks are vital for running an uninterrupted business, preventing data loss and maintaining the overall image of the business. Security challenges are increasing because networking is getting more complex, more dynamic and virtual. The existing approach of network visibility li...

Continue reading
  3418 Hits

How to Detect if a Rootkit Compromised Your System

​The importance of having a quality network test access port (TAP) when conducting Digital Forensics and Incident Response (DFIR) has been covered in a white paper by Profitap, titled "Special Tool for Special Forces: Tapping into real-time threats in the cyberspace". In addition to the points presented in the white paper, I would like to provide a...

Continue reading
  3729 Hits

Network Security Resilience – What Is It?

In a recent webinar, Best Practices for Security Resilience, Jon Oltsik (an analyst from ESG Research Group) and I discussed the topic of network security resilience. The basic concept is that it is not a question of "IF" your company network will be breached, but "WHEN". The real question for you to answer is, "How painful do you want that breach ...

Continue reading
  3652 Hits

Ixia's 2019 Security Report

Welcome to the third annual Security Report issued by Ixia, a Keysight business. Each year, the Ixia Application and Threat Intelligence (ATI) Research Centre summarizes the most interesting and prominent internet security trends. We analyze ATI data to help organizations understand where they can improve. We also analyze the data to predict the bi...

Continue reading
  3219 Hits

Give Your Network An Unfair Advantage Against Hidden Malware

​The IT role is extremely hard today. Whether you are part of the DevOps or SecOps team makes no difference - threats and problems are a daily, if not hourly, occurrence. What you need is good quality data as fast as you can get it to counter security threats, troubleshoot network outages, and remediate performance problems. Unfortunately, IT ...

Continue reading
  2931 Hits

It's Time to Prepare Your Network For the Effect of Rogue IOT Devices

One of the most common forms of network threats today is distributed denial of service (DDoS). An attack involves flooding networks and servers with false internet traffic, thereby blocking access to genuine devices. Sometimes used to target specific businesses, cyber-attacks can bring down entire telecoms networks, as was the case in the attack on...

Continue reading
  3101 Hits

Report Summary TLS 1.3 Adoption in the Enterprise

​Cyber defenses encrypt data to keep it safe while hackers encrypt malware to sneak threats onto your network. A new report from Enterprise Management Associates (EMA) says enterprises see the new Transport Layer Security (TLS) 1.3 encryption standards as offering greater privacy and security—over 70 percent of respondents have or will start enabli...

Continue reading
  3473 Hits

Making The Shift to Network Security Resilience

​In the webinar above,the concept of network security resilience and how to implement it is explained. However, successful implementation relies upon making the fundamental mind shift to the strategy. One cannot expect to see the benefits if they don't embrace change. ​However, change is easier said than done. It seems like many security engineers,...

Continue reading
  3065 Hits

How Resilient PNT is Used in Cybersecurity

Cybersecurity is a hot topic today. Hackers are always looking to undermine our network connections and we are always trying to protect against them.  I'm no cybersecurity expert, but I am often asked, "Can Resilient PNT be used to improve cybersecurity?" Resoundingly, "YES"  Here are a few simple examples:  1. Passwords - Most secur...

Continue reading
  3574 Hits

Visibility is Security

While security experts may disagree on exactly how to secure a network, one thing they all agree on is that you cannot defend against what you cannot see. In other words, network visibility IS network security. Visibility needs to be the starting the point. After that, you can implement whatever appliances, processes, and configurations you need to...

Continue reading
  3674 Hits

The Next Generation CISO

Every day we hear of security breaches, which damages the company brand and reputation.  At the present time the advantage has been with the attacker and the CISO is now expected to provide meaningful and actionable security intelligence to board members. So how can CISOs train tomorrow's security executives when today's well-known securi...

Continue reading
  3963 Hits

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...

Continue reading
  5853 Hits

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...

Continue reading
  5379 Hits

Ixia Has Your Secret Weapon Against SSL Threats

It has finally happened: thanks to advances in encryption, legacy security and monitoring tools are now useless when it comes to SSL. Read this white paper from Ixia, to learn how this negatively impacts visibility into network applications, such as e-mail, e-commerce, online banking, and data storage. Or even worse, how advanced malware ...

Continue reading
  4724 Hits

Viavi: Nearly 90 Percent of Enterprise Network Teams Spend Time Troubleshooting Security Issues; 80 Percent Report More Time Spent on Security vs. Last Year

Tenth Annual "State of the Network" Global Survey from Viavi Reveals Network and Security Trends from over 1,000 Network Professionals  In April 2017, Viavi Solutions (NASDAQ: VIAV) released the results of its tenth annual State of the Network global study today. This year's study focused on security threats, perhaps explaining why it gar...

Continue reading
  6431 Hits

Contact Us

Address:

Telnet Networks Inc.
4145 North Service Rd. Suite 200
Burlington, ON  L7L 6A3
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.