Data access security

securityAs time goes by, data access security is becoming a more pressing requirement in the technological world. Companies are more aware of how important it is to guarantee that those that access corporate platforms are who they say they are. Since the number of data stored is growing exponentially, the risk of identity theft poses a serious threat.

(more…)

Ignacio Esnoz: with a degree in Technical Telecomunications Engineering (specialized in Telematics). SD-WAN product specialist at Teldat.    

Moving towards a fully encrypted Internet: DNS encryption and ESNI in TLS

encrypted InternetWeb browsing first began as a system lacking in privacy that allowed users to view simple content in text mode. Since then, the service has evolved in both functionality–allowing you to view complex designs–and in its access methods–said web content can be downloaded encrypted.

(more…)

Javier Dargel: Telecommunication Engineer, is part of Teldat's R&D Department. Within this department he is specialized in Operating System Development

Web Filtering – Creating a more healthy and productive Internet experience

web filtering

Business, Schools, Government, and almost every other form of organization, cannot work without access to the Internet.  But while the Internet has accelerated productivity it has brought with it many dangers and distractions.  These Internet threats and danger can be managed efficiently by using Domain Name Systems (DNS) technologies.

(more…)

David Brebner: BEng in Electronics and MBA from Warwick Business School. David is Sales Vice President for FlashStart Internet Protection, a Teldat Partner for Web Filtering.

Security holes in modern processor hardware

cybersecurityA few months ago (January 2018), the media reported breaking news of alleged security failures for Intel and ARM processors. In order to understand these “weaknesses”, and before briefly describing the nature of these “security holes”, we need to list some of the common characteristics shared by modern processors.

(more…)

Manuel Sanchez: Manuel Sánchez González-Pola, Telecommunications Engineer, is part of Teldat’s R&D Department. Within this department he works as a Project Manager in the Hardware team.  

A Spectre is haunting not only Europe

Meltdown and spectreThe Meltdown and Spectre vulnerabilities were discovered last year, but only disclosed recently to the public. Both vulnerabilities are of the same family. They fundamentally affect certain CPU designs with around 20-years’ worth of processors and certain upcoming designs cannot be classified totally secure.

(more…)

Heidi Eggerstedt: Heidi Eggerstedt is part of the bintec-elmeg's Marketing Department. Within this department she is responsible for Marketing Documentation and Translations

WannaCry?

wannacry

The first and so far the only time I was personally involved, (or to be more precise my son who at that time was eleven years old), in a cyber-attack by ransomware was in 2012. The computer of my son was apparently blocked by the Federal Criminal Police Office due to some illegal actions, such as sending spam mails and even worse. At least that’s what appeared on the screen in poor German. Strangely enough a fee of 100 Euros would unblock the computer. Well, I wondered how the 100 Euros would affect  the illegal activities, my eleven year old boy had committed but you never know. Even though it was obvious that we didn’t get into trouble with the public authorities, my son was not amused by the fact that his computer was out of order. In fact, he must have felt exactly how the latest cyber attack has been dubbed: WannaCry.

(more…)

Heidi Eggerstedt: Heidi Eggerstedt is part of the bintec-elmeg's Marketing Department. Within this department she is responsible for Marketing Documentation and Translations