Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

WPA-3

Wi-Fi clients have been using the same security protocol for many years. The Wi-Fi Alliance just announced WPA3, a Wi-Fi security standard that will replace WPA2. the Wi-Fi Alliance is underway to certify new products that support WPA3, Seveal manufacturers such as Qualcomm has begun to make chips for phones and tablets, Cisco has also announced upcoming support that could even update existing devices to support the WPA3.

Read More

Password Protection

Most, if not all of us know the feeling of getting to work on a Monday morning to be confronted by a message forcing us to change our password, these are seen to be annoying or too frequent by non-security personnel.

Read More

Cloud Security

As more organisations are considering transferring to a cloud-based platform; security is becoming more of an importance. Cloud platforms such as Amazon AWS, Google cloud platform and Azure rank security as a top priority.

Read More

GDPR

In this blog I will be talking about GDPR, and why you need to know all about the new regulation.

Read More

Big Data Dangers

As many of you will no doubt be aware, it has been a long time since I’ve graced the website with my dulcet tones, and although the masses must now be swarming to read my latest blog post

Read More

Operation Power Off

We all know that the term hacking is used quite loosely these days and can be used in a multitude of scenarios, both IT and non-IT. The actions that most people see as hacking has become extremely easy for anyone with just basic IT knowhow and knowledge as to where to find online tools.

Read More

Why I Chose A Degree Apprenticeship

A Degree Apprenticeship brings together higher and vocational training, it enables university study and the invaluable on-the-job training typical of an apprenticeship, without the apprentice having to cover the cost of tuition or training fees. See first hand from an apprentice at Satisnet the experience of doing a Degree apprenticeship.

Read More

New Evasive Technique - Early Bird Code Injection

These days many researchers have acknowledged an Early Bird code injection technique used by the Iranian group APT33 to tunnel the TurnedUp malware inside infected systems while bypassing anti-malware tools.

Read More

Funding secured to develop high level cybersecurity course

The University of Wolverhampton has secured £192,000 to develop cybersecurity courses in support of the Industrial Strategy.

Read More

Satisnet at InfoSecurity Europe 2017

So InfoSecurity Europe 2017 is over and it’s certain that London Olympia was once again packed with cyber security professionals and there was more invaluable content across the stages and throughout the show!

Read More

Containerisation: Why Traditional Security will End in Tears

Containerisation, which was once considered to be the ‘geek’s’ topic’, has now become a major focal point for the IT enterprise security team. It has also emerged as a preferred foundation of DevOps and an answer to many deep-rooted operational issues.

Read More

The Top 5 Myths of Next-Gen Endpoint Protection

‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online

Read More

StealthINTERCEPT v4.0 has arrived!

Active Directory (AD), File Systems, and Exchange are giant figures on any organisation’s threat surface. However, most organisations lack visibility and control over changes and activities taking place in these environments, resulting in major security and operational risks. StealthINTERCEPT provides crystal clear visibility into and control over the changes and activities that violate your security and operational policies, strengthening your organisation’s security from the core and eliminating unnecessary risks.

Read More

Questions to Consider When Calculating Cost of Ownership in Security

There have been times in history when a certain force dominates the landscape. That is to say, when a nation dominates the world. Examples include Egypt, Persia, Rome, France, England, and the United States. Military history shows us that each time, these forces were able to dominate largely because of technology. They built a powerful technology that could be wielded…

Read More