Logo Teldat
AI-driven threat detection & response in the age of intelligent cyberattacks

AI-driven threat detection & response in the age of intelligent cyberattacks

In a world where artificial intelligence is advancing by leaps and bounds, organizations face a significant increase in the volume and complexity of cyberattacks. The need for AI-driven threat detection and response has never been more urgent. One of the most notable attacks in this context has been the CTC-1002, which demonstrated the capability and versatility of LLMs to orchestrate...

read more
Cloud Native SASE architecture protecting your business in a borderless world

Cloud Native SASE architecture protecting your business in a borderless world

Not long ago, keeping a corporate network secure was straightforward. Employees worked from the office. Apps lived in the data centre. IT drew a clear line between “inside” and “outside.” A firewall at the door and a VPN for the occasional remote worker done. "That world is gone and it is not coming back". The new reality of work Today, your people work from home, from airports, from client...

read more
Active Directory – Authentication: The key to secure, frictionless access

Active Directory – Authentication: The key to secure, frictionless access

In an increasingly identity-driven world, giving users secure, controlled, and efficient access to systems is a top priority for any organization. Authentication has come a long way from simple local passwords to complex ecosystems that combine directories, centralized policies, and identity federation. Among these approaches, Active Directory (AD) integrated authentication stands out for its...

read more
Why the world is now looking to Europe to lead cybersecurity?

Why the world is now looking to Europe to lead cybersecurity?

Over the past decade, cybersecurity has evolved from a specialized technical field into a core pillar of national resilience and executive responsibility. Today, boards and public administrations worldwide face a simple yet crucial question: Who can we trust to protect the systems that underpin our economies, safeguard our citizens, and uphold our institutional legitimacy? What we have seen is...

read more
Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. It’s not just about more connected devices — it’s about increasingly intelligent nodes with processing and decision-making capabilities at the network edge. This technological shift expands the attack surface and introduces new vectors for sophisticated...

read more
A New Path to IPv6 Networks

A New Path to IPv6 Networks

The shortage of IPv4 addresses has accelerated the move toward IPv6. With roughly 4.3 billion possible addresses (32 bits), IPv4 can no longer meet the needs of modern connected devices. IPv6, by contrast, uses 128 bits—roughly 340 sextillion addresses—providing virtually unlimited capacity for growth. Over the past few decades, several methods have been developed to ease the transition from...

read more