Logo Teldat
Cloud Native SASE architecture protecting your business in a borderless world

Cloud Native SASE architecture protecting your business in a borderless world

Not long ago, keeping a corporate network secure was straightforward. Employees worked from the office. Apps lived in the data centre. IT drew a clear line between “inside” and “outside.” A firewall at the door and a VPN for the occasional remote worker done. "That world is gone and it is not coming back". The new reality of work Today, your people work from home, from airports, from client...

read more
Active Directory – Authentication: The key to secure, frictionless access

Active Directory – Authentication: The key to secure, frictionless access

In an increasingly identity-driven world, giving users secure, controlled, and efficient access to systems is a top priority for any organization. Authentication has come a long way from simple local passwords to complex ecosystems that combine directories, centralized policies, and identity federation. Among these approaches, Active Directory (AD) integrated authentication stands out for its...

read more
Generative AI as an attack vector: a new frontier in Cybersecurity

Generative AI as an attack vector: a new frontier in Cybersecurity

Generative Artificial Intelligence (Generative AI) is redefining the cybersecurity landscape in ways that go far beyond the purely technical. Its impact extends to the strategic level, affecting the digital and geopolitical sovereignty of companies and governments worldwide. What until recently seemed like science fiction machines capable of creating, adapting, and executing attacks autonomously...

read more
Why industrial OT security specialization is no longer optional

Why industrial OT security specialization is no longer optional

The factory floor is now a cyber battlefield. As industrial environments become increasingly connected, the traditional approach of treating Operational Technology (OT) security as an afterthought—or worse, as an extension of IT security—is proving dangerously inadequate. Industrial OT security specialization has emerged as a critical discipline, demanding dedicated expertise, tailored...

read more
What is the CCN and how does it relate to the ENS, the CPSTIC Catalog, and cybersecurity products?

What is the CCN and how does it relate to the ENS, the CPSTIC Catalog, and cybersecurity products?

In Spain, public-sector cybersecurity is structured around several key concepts: the National Cryptology Center (CCN), the National Security Framework (ENS), the CPSTIC Catalog, and the Qualified and Approved cybersecurity products listed within it. Although closely interconnected, each plays a distinct role within Spain’s public information security ecosystem. This article explains what each...

read more
Connected trains, accelerated defense: real-time Cybersecurity for embedded networks

Connected trains, accelerated defense: real-time Cybersecurity for embedded networks

In the 21st century, trains have evolved far beyond steel and track gauge. Modern rolling stock increasingly incorporates one or more IP networks that are growing ever more complex. Connected passengers, smart sensors, and critical operating systems now converge within the same environment, sharing physical cabling and radio spectrum. This digital transformation has delivered greater efficiency...

read more