Logo Teldat
Cloud Native SASE architecture protecting your business in a borderless world

Cloud Native SASE architecture protecting your business in a borderless world

Not long ago, keeping a corporate network secure was straightforward. Employees worked from the office. Apps lived in the data centre. IT drew a clear line between โ€œinsideโ€ and โ€œoutside.โ€ A firewall at the door and a VPN for the occasional remote worker done. "That world is gone and it is not coming back". The new reality of work Today, your people work from home, from airports, from client...

read more
Active Directory – Authentication: The key to secure, frictionless access

Active Directory – Authentication: The key to secure, frictionless access

In an increasingly identity-driven world, giving users secure, controlled, and efficient access to systems is a top priority for any organization. Authentication has come a long way from simple local passwords to complex ecosystems that combine directories, centralized policies, and identity federation. Among these approaches, Active Directory (AD) integrated authentication stands out for its...

read more
Why the world is now looking to Europe to lead cybersecurity?

Why the world is now looking to Europe to lead cybersecurity?

Over the past decade, cybersecurity has evolved from a specialized technical field into a core pillar of national resilience and executive responsibility. Today, boards and public administrations worldwide face a simple yet crucial question: Who can we trust to protect the systems that underpin our economies, safeguard our citizens, and uphold our institutional legitimacy? What we have seen is...

read more
Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. Itโ€™s not just about more connected devices โ€” itโ€™s about increasingly intelligent nodes with processing and decision-making capabilities at the network edge. This technological shift expands the attack surface and introduces new vectors for sophisticated...

read more
A New Path to IPv6 Networks

A New Path to IPv6 Networks

The shortage of IPv4 addresses has accelerated the move toward IPv6. With roughly 4.3 billion possible addresses (32 bits), IPv4 can no longer meet the needs of modern connected devices. IPv6, by contrast, uses 128 bitsโ€”roughly 340 sextillion addressesโ€”providing virtually unlimited capacity for growth. Over the past few decades, several methods have been developed to ease the transition from...

read more
Threats to Cybersecurity in the Banking Sector

Threats to Cybersecurity in the Banking Sector

The digitalization of the financial sector has optimized service efficiency, remote access to banks and improved user experience. However, the risk of suffering cyberattacks has grown exponentially. In this context, cybersecurity has become a key strategic pillar for the progress of digitalization in the banking sector. The vast majority of reports show banks and Fintechs are the most attacked...

read more