Logo Teldat

NEWS

Why the world is now looking to Europe to lead cybersecurity?

Why the world is now looking to Europe to lead cybersecurity?

Over the past decade, cybersecurity has evolved from a specialized technical field into a core pillar of national resilience and executive responsibility. Today, boards and public administrations worldwide face a simple yet crucial question: Who can we trust to protect the systems that underpin our economies, safeguard our citizens, and uphold our institutional...

read more
Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. It’s not just about more connected devices — it’s about increasingly intelligent nodes with processing and decision-making...

read more
A New Path to IPv6 Networks

A New Path to IPv6 Networks

The shortage of IPv4 addresses has accelerated the move toward IPv6. With roughly 4.3 billion possible addresses (32 bits), IPv4 can no longer meet the needs of modern connected devices. IPv6, by contrast, uses 128 bits—roughly 340 sextillion addresses—providing...

read more
SD-WAN Automation: The Secret to Large-Scale Deployments

SD-WAN Automation: The Secret to Large-Scale Deployments

Today’s corporate networks are undergoing rapid transformation. The digitization of processes, mass adoption of cloud applications, and the growth of remote work have made connectivity a strategic resource. SD-WAN has become a key technology, enabling traffic...

read more
CE Marking – Certification and Marking

CE Marking – Certification and Marking

The certification of devices equipped with radio technology, together with their corresponding marking, has always been essential to ensure operational safety, electromagnetic compatibility, and the interoperability between systems. These processes were traditionally...

read more
Post-Quantum Cryptography: The Future of Digital Security

Post-Quantum Cryptography: The Future of Digital Security

Cryptography is the backbone of modern digital security, protecting everything from banking transactions to personal communications. However, advances in quantum computing threaten to break many of today’s cryptographic systems. This has spurred the development of...

read more
Constraint-Based Electronic Design

Constraint-Based Electronic Design

"The Constraints". While electronic schematics provide a practical way to represent the components and connections within a circuit, they are ultimately a simplification that overlooks important aspects of how the circuit actually behaves. Connection lines are assumed...

read more
Your Features are only as Strong as Your Hardware

Your Features are only as Strong as Your Hardware

In the telecom world innovation has taken the spotlight, opening the doors to new protocols, cutting-edge features, ambitious capabilities like 5G, NGFW, etc. Yet behind the scenes, there's a less glamorous, but equally vital actor: the robust hardware supporting all...

read more
Threats to Cybersecurity in the Banking Sector

Threats to Cybersecurity in the Banking Sector

The digitalization of the financial sector has optimized service efficiency, remote access to banks and improved user experience. However, the risk of suffering cyberattacks has grown exponentially. In this context, cybersecurity has become a key strategic pillar for...

read more
VXLAN: The Key to Scalable and Flexible Networks

VXLAN: The Key to Scalable and Flexible Networks

Modern data centers demand high scalability, advanced network segmentation, and seamless workload mobility—especially in environments with virtual machines and containers. VXLAN (Virtual Extensible LAN) meets these needs by extending Layer 2 networks over a Layer 3...

read more
Certified Products – A key factor for companies & customers

Certified Products – A key factor for companies & customers

Certifying a company’s products according to specific standards is a crucial process that brings a variety of benefits to both the company and its customers, as well as to society at large. Have certified products involves evaluating and ensuring that a product meets...

read more
Smart Contracts: Innovation and Risks in the Digital Economy

Smart Contracts: Innovation and Risks in the Digital Economy

The emergence of Bitcoin in 2008 marked the beginning of a technological revolution that led to the development of blockchain technology, laying the foundation for smart contracts. These applications, fundamental to the decentralized applications (Dapps) ecosystem,...

read more
The Impact of Ransomware on Critical Infrastructure

The Impact of Ransomware on Critical Infrastructure

Over the past decade, ransomware has evolved from a relatively minor threat into one of the most pressing cybersecurity challenges worldwide. This form of attack—where cybercriminals encrypt a victim’s data and demand a ransom for its release—has shifted from...

read more

Ready to take the Next Step?