Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

Carbon Black Defense "Put To The Test" @ Satisnet

If you haven’t heard of Carbon Black Defence it is a next-generation anti-virus solution for desktops, laptops, and servers that protects computers from the full spectrum of modern cyber-attacks, delivering the best endpoint protection with the least amount of work.

Read More

Modifying Carbon Black Response Users Without Access To The GUI

In this blog I will show you how to do a change password, unlock a user and add a user to carbon black response without access to the GUI. Please note this works for all versions of response.

Read More

What is IBM Security App Exchange & A Look At Carbon Black's Response App

This series of blogs has been created with the intention of shedding some light on a still rather underused area of the IBM X-Force Exchange, and that is the Security App Exchange. The Security App Exchange has a whole host of applications that add a significant amount of helpful functions and content into three of IBMs most prevalent security solutions, QRadar, BigFix and X-Force Exchange.

Read More

Critical Infrastructure Q&A with National Security Strategist Eric O' Neil

As Carbon Black’s national security strategist, Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters. He is a practicing attorney who specializes in cyber-security vulnerability assessments, counterintelligence and counter terrorism operations, investigations into economic espionage, internal investigations and security risk assessment consulting.

Read More

Three Cybersecurity Hurdles We Must Overcome in 2017

Every month, cyber attacks seem to whiplash back to center stage. There are dozens of headlines at any given moment that should be catalysts for cybersecurity change. But things do not change and, in fact, they may be getting worse.

Read More

It's Time To Replace Your Antivirus

In recent weeks, we’ve written on some pretty timely and interesting topics. We first discussed the ineffectiveness of traditional antivirus, which catches less than half of noteworthy malicious events. We then introduced, defined, and discussed Next-Generation Antivirus (NGAV), the natural (and much needed) evolution of AV that protects computers from the full spectrum of modern cyber attacks.

Read More

Carbon Black's Cb Defense is the First NGAV To Prove Complete Antivirus Efficacy to Meet PCI DSS Requirement 5

Many organizations are very unhappy with their traditional antivirus (AV) products. At the same time, there’s concern within these organization’s that if they try to replace AV, they will fail to meet compliance requirements. That’s no longer a concern with Cb Defense.

Read More

How Ransomware Works

Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and steals valuable information, ransomware doesn’t hide. As soon as ransomware has locked a user’s machine and/or encrypted files, it notifies the user of its presence to make the ransom demand.

Read More

Forbes Ranks Carbon Black As a Top Cloud Company

Forbes recently announced its inaugural Cloud 100 list, a full ranking of the world’s top privately-held cloud companies. Carbon Black are proud be named No. 26 on the list alongside such innovators as Slack, Dropbox, DocuSign, Stripe, Cloudera and others.

Read More

Cybersecurity Self-Esteem: 4 Things Confident Teams Are Doing

Security teams need to hear a public service announcement. “Believe in yourself. Have confidence. You can do it!” It may sound corny, but it’s true. I’ve spoken to more than 600 organisations — from mature businesses to entry-level startups. What I’m noticing is that many of these cybersecurity teams — from Singapore to Silicon Valley – do not have good self-esteem right now.

Read More

Protect against CryptoLocker Ransomware

Recently, attackers employing a CryptoLocker variant have been removing volume shadow copies on systems, disallowing the users from restoring those files and then encrypting the files for ransom. If a user cannot recover from backups, he/she is at the attacker’s mercy.

Read More

In Choosing Between Humans and Machines, You Want 'All the Things!'

What’s your bet on the best approach to combating hackers? Are you betting on some kind of AI algorithm? Think big-data processing will win it? Or, are you putting your faith in creative human beings? Darpa’s answer is: “Yes! We want all the things!” And they’ve got the Red Team/Blue Team outcomes to prove it!…

Read More

Questions to Consider When Calculating Cost of Ownership in Security

There have been times in history when a certain force dominates the landscape. That is to say, when a nation dominates the world. Examples include Egypt, Persia, Rome, France, England, and the United States. Military history shows us that each time, these forces were able to dominate largely because of technology. They built a powerful technology that could be wielded…

Read More

Gartner EDR Report Highlights the Emergence of NGAV

In Gartner’s recent technological EDR assessment “Comparison of Endpoint Detection and Response Technologies and Solutions,” Cb Response was cited as the most talked about solution in the industry and achieved the best possible score in every category of its comparative analysis.

Read More

Carbon Black Aims To Be Leader In Endpoint Security With Confer Buy

End-point security vendor Carbon Black has acquired next-generation anti-virus vendor Confer, its fourth acquisition in less than three years. The vendor bought Confer for an undisclosed amount, and adds Confer’s 50 employees to its current headcount of 600 staff members.

Read More

Attack: Best Form Of Defense From The IT Insider

The IT Insider talks to Satisnet about CyberKombat – a brand new experience designed to replicate a serious cyber-attack on an organisation, giving security teams the opportunity to test their abilities in a real life situation.

Read More

New Year, New Habits, New Preparation

Often times in security, an “incident” becomes a catalyst for change, but why wait for something bad to happen? The inevitability of compromise is very real in today’s threat landscape. It’s become almost cliché for us to say: “it’s not a matter of if, but when an attack will occur,” but there is a significant amount of truth to that statement.

Read More