BLOG
From Firewalls to XDR: A Historical Journey Through Enterprise Cybersecurity
The Ever-Evolving Cyber Threat Landscape Over the past few decades, cybersecurity has undergone a profound transformation in response to an increasingly interconnected and digitalized world. What once revolved around basic perimeter defenses—such as traditional firewalls—has evolved into far more comprehensive and proactive security strategies, including Extended...
Kategorien
Cyber security in the Railways Industry
Cybersecurity has become a real trendy world in everybody’s live either used as a fancy term, to generate confidence associated to high technology topics, or to create panic and generate that sense of fear and urge for protection. We can find this uncomfortable…
Why the cybersecurity threat to banks has so significantly increased
Bank ATM cashpoint machines have always been prime targets for both physical and cyber threats for obvious reasons; they contain large amounts of cash and sensitive customer information. Yet, as the growth in hybrid working and migration to cloud applications has…
MTBF and hardware reliability
This year’s University Entrance Exam (EVAU) for physics in Madrid included a question on atomic decay..
The difficulty could lie not so much in physical concepts as in statistics, and with an equation as simple and seemingly innocent as the exponential: This equation
Ensuring cybersecurity for healthcare research data
In the wake of the pandemic, nations worldwide are seeking a return to good public health and economic recovery. Any such return can be critically aided by an adequate supply of vaccines which can be administered to millions of people without a hitch. However, the...
The main advantages of OpenStack and its deployment methods
Due to the growing demand for resources driven mainly by the increasing number of devices with Internet access, it’s hard to find organizations or companies today that aren’t benefitting from the advantages of cloud computing. Acquiring and maintaining expensive...
Digitalizing SASE to enhance network protection in the cloud age
SASE – Secure Access Service Edge – is increasingly important as flexible working becomes a standard aspect of corporate IT. Managing cyberthreats is steadily more difficult as the traditional network perimeter disappears. With employees working remotely and new...
Transformers: BERT
It is no secret that in the near future, Artificial Intelligence will be implemented in most technological devices. This is because Artificial Intelligence algorithms allow to predict and make decisions with a human-like reasoning for very specific tasks, reducing...
How the latest vehicle connectivity technologies can create new competitive advantages for bus fleet operators
For many years, bus fleet operators have been able to offer basic internet services to their passengers, based on 3G or 4G communications and, probably, Wi-Fi 5 (IEEE 802.11 ac) which was released in 2014.By now, offering such services is not enough to make a fleet...
The importance of maintaining high air quality
The advent of COVID-19 has made us all keenly aware of the critical role of high air quality, with good ventilation to mitigate the risk of infection. Yet the need to avoid this risk was recognized well before the pandemic arose, and will remain just as important even...
Teldat launches be.Safe XDR
Provides information on users’ network experience, optimizes performance and facilitates troubleshooting.
5G FWA vs fiber – Which is best?
Although superfast broadband (5G Fwa) - with a download speed of at least 30Mbps - is by now widely available, the demand for services that use ever-higher volumes of data with equal availability and reliable connectivity is steadily increasing. This has been...
How software can enable rolling stock digitalization
5G is allowing rail operators to gain a competitive edge through digitalizing its rolling stock. However, managing large volumes of widely dispersed network equipment can be challenging.
This post discusses how SD-WAN technology provides rail operators with the software tools they need to overcome these challenges.



















