https://www.teldat.com/wp-content/uploads/2022/06/cropped-Ignacio-Esnoz-500x500-1-96x96.png
Ignacio Esnoz

Ignacio Esnoz

with a degree in Technical Telecomunications Engineering (specialized in Telematics). Cybersecurity product specialist at Teldat.  
Attacks on Artificial Intelligence: Threats and defenses

Attacks on Artificial Intelligence: Threats and defenses

In this era of technology and digitalization, Artificial Intelligence (AI) has become a powerful, widely used tool in various fields. From healthcare to cybersecurity to speech recognition, AI has revolutionized our interactions with technology and proven its potential in improving the efficiency and accuracy of automated tasks. But as AI becomes more prevalent, so too do concerns about the...

read more
Artificial Intelligence with Machine Learning and Deep Learning applied to Cybersecurity

Artificial Intelligence with Machine Learning and Deep Learning applied to Cybersecurity

Artificial Intelligence - AI and cybersecurity are two terms that are becoming increasingly popular in today's digital age. While AI refers to the simulation of human intelligence in machines that are capable of performing tasks such as learning, decision making, and problem solving, cybersecurity refers to the protection of digital information and systems from unauthorized access, theft, and...

read more
The synergistic benefits of integrating 5G FWA with SD-WAN

The synergistic benefits of integrating 5G FWA with SD-WAN

After summarising why corporate users are moving from MPLS to SD-WAN networking, this post looks at how SD-WAN is being further enhanced by the advent of 5G. Modern corporate enterprises – or even smaller-scale businesses – depend on secure, reliable, and increasingly high performance computing power to operate competitively, or even survive. Equally, though, they need a communications and...

read more
SD-WAN advantages compared to VPN

SD-WAN advantages compared to VPN

In the past year, COVID-19 has forced many companies to accelerate their digitalization process. Employees have had to perform their duties from remote locations (mainly from home) in places that, up until now, were outside the corporate perimeter. This has posed a great many challenges because of the multiple types of existing lines and connections (xDSL, FTTH, 4G…), which, in addition, being...

read more
Data access security

Data access security

As time goes by, data access security is becoming a more pressing requirement in the technological world. Companies are more aware of how important it is to guarantee that those that access corporate platforms are who they say they are. Since the number of data stored is growing exponentially, the risk of identity theft poses a serious threat. Nowadays, the most common authentication system is...

read more
Segmentation in SD-WAN

Segmentation in SD-WAN

The SD-WAN market is gaining more and more strength; software-defined and managed connectivity solutions provide ever more possibilities and functionalities to adapt to the reality of business networks. One of the key aspects that all companies value is security. In SD-WAN networks, security can be provided in a number of ways, from encrypting communications to firewall policies, through IDS and...

read more