Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

baseStriker Vulnerability - Office 365

Office 365, often seen as the bastion of hope for business office activities, has recently seen a vulnerability thought to be the “largest ever” flaw in the Office 365 platform.

Read More

Extra resources for vulnerability scanning with Tenable

Having a vulnerability scanner like Tenable.io or SecurityCenter is a crucial part of your internal security practices, but so often I hear our customers asking for additional help with understanding or interpreting scan results, or building actionable reports for their business.

Read More

Tenable - Host Discovery Option

Tenable scan policies consist of plugin settings and advanced commands used during the scan process. Scan policies can be created by users within the Tenable application. Within Tenable’s scanning products. E.g. Nessus, SecurityCenter and Tenable.io there is a range of default policies which can be used.

Read More

XSS Web Application Vulnerability

XSS (short for Cross-Site Scripting) is a well-known vulnerability that affects many web applications. The risk behind XSS is that it allows an attacker to inject content into a website and modify how it is displayed, making a victim’s browser to execute the code provided by the attacker while loading the page.

Read More

SecurityCenter Dashboards

Dashboards are one of the most common tools that are found in nearly every security tool that is available on the market today. However I often still find customers that are completely underutilising these valuable dashboards, and if utilised correctly can provide important metrics in a quick and easy to view manner.

Read More

Tenable Allows Least Privilege SSH Scans

Credentialed scans have long been encouraged as the quickest and most accurate way to perform a vulnerability assessment against any network. However, customer always run into problems which are related to users or process which need to be followed.

Read More

Tips to Secure Your Network and Reduce The Chance of Being Hit By KRACK

A vulnerability has recently been discovered named KRACK. It targets the link between your device and the Wi-Fi access point, i.e. a router either in your home or office. The following tips can help to improve the security of your connection.

Read More

SecurityCenter Assurance Report Cards - Better Metrics for Faster Results

With the release of SecurityCenter 5.0 almost two years ago, Tenable introduced a new metric based analysis method for your vulnerability, compliance and event data – Assurance Report Cards, or ARCs. I am often asked by existing customers how ARCs can be used effectively to help track and remediate vulnerabilities or other security concerns effectively.

Read More

Vulnerability Prioritization with Nessus Cloud

If you’re a security professional, vulnerability prioritization is likely something you deal with frequently. Few, if any organizations ever address 100% of discovered vulnerabilities, as new vulnerabilities come out every day and old vulnerabilities can hide out on unknown and shadow assets or simply never make it to the top of the patching priority list.

Read More

Tenable Network Security Integation with McAfee ePolicy Orchestrator Delivers Comprehensive Vulnerability Data To Customers

Industry leader in next-generation vulnerability management helps Intel Security customers fill security gaps and maintain an accurate inventory of assets across the IT environment

Read More

Security Metrics are About Illustrating Criticality vs Risk

Tenable Recently sponsored the publication of an ebook, Using Security Metrics to Drive Action. This ebook is a compilation of thoughtful essays from 33 CISOs and other experts, who all share their strategies for communicating security program effectiveness to business executives and the board. In this article, excerpted from the ebook, Genady Vishnevetsky, CISO for Stewart Title Guaranty Company, talks about how the criticality of assets impacts risk factors.

Read More