Teldat Blog
Read our latest Teldat´s Blog Posts
The Rail Industry in the EU: Towards digitalization
When it comes to transportation, the train represents a symbol of pride for many European countries, reflecting the progress of industrial...
The importance of Network Traffic Analysis – NTA tools in implementing cybersecurity in companies
Network Traffic Analysis - NTA tools and cybersecurity are two key areas of IT security. Both are essential to protect an organization’s systems and...
Artificial Intelligence with Machine Learning and Deep Learning applied to Cybersecurity
Artificial Intelligence - AI and cybersecurity are two terms that are becoming increasingly popular in today's digital age. While AI refers to the...
The benefits of wireless connectivity
The emergence of compact wireless routers promises to optimize the deployment of distributed locations for different sorts of businesses. As a...
Should my company migrate to SD-WAN?
The world of corporate telecommunications is undergoing a technological transformation. We have gone from connecting branch office networks through...
5G Challenges in Smart Grid Electrical Distribution Networks
The world and Europe are currently experiencing a context of climate emergency, energy scarcity and electrification of energy consumption. In this...
OT cybersecurity in critical infrastructures
Now that mass and social media are booming, it is normal for marketing to take over and for technological terms to become more trivialized and...
Zero Trust Approach and Unified Cloud Security
Introduction In the new paradigm of the connected world, where everything and everyone has access to the Internet, having a totally secure network...
The role of communications in the automation and remote control of distribution networks
Electric distribution companies have tens of thousands of transformation centers that perform the function of distributing electric power, taking...
VoIP and the benefits it can bring
The term VoIP is an acronym for Voice over Internet Protocol, which means voice over the Internet. It is the technology used to deliver voice and multimedia sessions (such as video) via an Internet Protocol (IP). VoIP phones are therefore physical devices or computer/mobile software designed to transmit voice over the Internet. This allows audio signals from a standard telephone to be converted..
Cyber security in the Railways Industry
Cybersecurity has become a real trendy world in everybody’s live either used as a fancy term, to generate confidence associated to high technology topics, or to create panic and generate that sense of fear and urge for protection. We can find this uncomfortable…
Why the cybersecurity threat to banks has so significantly increased
Bank ATM cashpoint machines have always been prime targets for both physical and cyber threats for obvious reasons; they contain large amounts of cash and sensitive customer information. Yet, as the growth in hybrid working and migration to cloud applications has…





















