Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

Tenable Pledges to Fight Global Cyberattacks with 33 Leading Companies

In today’s digital economy, it has become paramount for companies to defend customers from malicious attacks by criminal enterprises and nation states.

Read More

Tenable Unveils Industry's First Cyber Exposure Benchmarking Solution

Tenable®, Inc., the Cyber Exposure company, today unveiled Tenable.io™ Lumin, a new Tenable.io application that for the first time empowers CISOs to confidently visualize, analyze and measure their organization’s Cyber Exposure.

Read More

Extra resources for vulnerability scanning with Tenable

Having a vulnerability scanner like Tenable.io or SecurityCenter is a crucial part of your internal security practices, but so often I hear our customers asking for additional help with understanding or interpreting scan results, or building actionable reports for their business.

Read More

Tenable - Host Discovery Option

Tenable scan policies consist of plugin settings and advanced commands used during the scan process. Scan policies can be created by users within the Tenable application. Within Tenable’s scanning products. E.g. Nessus, SecurityCenter and Tenable.io there is a range of default policies which can be used.

Read More

SecurityCenter Dashboards

Dashboards are one of the most common tools that are found in nearly every security tool that is available on the market today. However I often still find customers that are completely underutilising these valuable dashboards, and if utilised correctly can provide important metrics in a quick and easy to view manner.

Read More

Tenable Allows Least Privilege SSH Scans

Credentialed scans have long been encouraged as the quickest and most accurate way to perform a vulnerability assessment against any network. However, customer always run into problems which are related to users or process which need to be followed.

Read More

Improving Scans With Assets In SecurityCenter

Assets within SecurityCenter are one of the more powerful objects that can be used, but I often discover when working with my customers that they are ignored or at most, misunderstood.

Read More

SecurityCenter – Speedier Remediating

A Verizon Data Breach Report release always brings with it a wealth of information regarding industry trends towards the discovery of vulnerabilities and how fast organisations are able to act once they have been discovered; and this year is no different.

Read More

Your KPI's At Work: Assurance Report Cards in SecurityCenter

One of the requests I get most often when discussing Vulnerability Management with our customers is how to properly track KPIs, SLAs and other business metrics. Most of us have to adhere to some kind of governance or tracking to ensure we meet our targets for discovery or remediation when it comes to vulnerabilities.

Read More

Tenable SecurityCenter & Thycotic Secret Server: Enterprise Class Scan Credential Management

If you are a Security Center user, you’ll be pleased to hear that Tenable have integrated on-demand credential retrieval from Thycotics flagship PAM product, Secret Server!

Read More

WannaCry – Ransomware explosion hits hundreds of companies around the world

By now, we’ve all heard of the events of Friday 12th May. One of the largest, highly-profiled ransomware attacks struck the NHS and other organisations, but few are probably aware of the scale of the assault. Targets were also attacked in Spain, Brazil, Russia, India, China and throughout EMEA – this attack hit hard throughout the world.

Read More

Transforming Vulnerability Management: Introducing Tenable.io

The vulnerability management industry is at a crossroads: solve long-standing problems and equip security teams for the future, or become obsolete.

Read More

Tenable Delivers LCE 5.0.0

Tenable is pleased to announce a major update to the Log Correlation Engine® (LCE®), making it easier to scale horizontally to meet growing organizational demands on performance and redundancy. Additionally, LCE 5.0.0 greatly expands language support for log data. This release will be available on January 30th, 2017.

Read More

Containerisation: Why Traditional Security will End in Tears

Containerisation, which was once considered to be the ‘geek’s’ topic’, has now become a major focal point for the IT enterprise security team. It has also emerged as a preferred foundation of DevOps and an answer to many deep-rooted operational issues.

Read More

Tenable Welcomes Amit Yoran as Chairman and CEO

Tenable has announced that Amit Yoran, president of RSA, will be their new Chairman and CEO, effective January 3, 2017. They are honored to welcome one of the security industry’s most esteemed leaders and visionaries to their team.

Read More

Vulnerability Prioritization with Nessus Cloud

If you’re a security professional, vulnerability prioritization is likely something you deal with frequently. Few, if any organizations ever address 100% of discovered vulnerabilities, as new vulnerabilities come out every day and old vulnerabilities can hide out on unknown and shadow assets or simply never make it to the top of the patching priority list.

Read More

Tenable Network Security Integation with McAfee ePolicy Orchestrator Delivers Comprehensive Vulnerability Data To Customers

Industry leader in next-generation vulnerability management helps Intel Security customers fill security gaps and maintain an accurate inventory of assets across the IT environment

Read More

Tenable Network Security Acquire FlawCheck - Container Security

See what our Tenable Engineer has to say about Tenable Network Security's new acquisition of FlawCheck

Read More

Expanding Vulnerability Management to Container Security: FlawCheck Joins Tenable

Today marked a significant milestone, as Tenable Network Security announced the acquisition of FlawCheck, a company that Sasan Padidar and I founded in early 2015. We built FlawCheck to address the difficulty of detecting security risks, at scale, in the world's largest data centers. As we engaged with some of the largest companies on their next-generation data center security challenges, we honed in on container environments as an area particularly fraught with issues.

Read More

Is Mr.Robot in Your Network

In Season 2 Episode 6 of Mr. Robot, Darlene and Angela continue with infiltration of the FBI and E-Corp, while Elliot is otherwise detained. Because Angela must plant the femtocell in E-Corp, members of F-Society help her learn the commands that are needed. They also offer an alternative called a “Rubber Ducky,” a USB device that registers itself as a Human Interface Device (HID) or keyboard. Since all systems trust HIDs, they are able to bypass policies that don’t allow USB storage devices. However, the infiltration plan is executed as planned with the femtocell device.

Read More

Pages