Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

How offering conversion training to ex-military personnel can help close the notable skills gap in cybersecurity

Research by Frost and Sullivan confirms there is a significant gap of available qualified cybersecurity professionals and states there will be 1.8 million unfilled cybersecurity positions by 2022. (1)

Read More

Password Rules

Ok so not the most riveting blog in the world but keeping up to date with anything IT security related is a must even if it does mean reading a page full of bullet points! Although it can be used as a reference when raining staff or even yourself.

Read More

Methodology To Implementing Patch Management

We are constantly seeing that the time period between a vulnerability is discovered in application or OS and appearance of an exploit is getting shorter, in some instances it has taken only a few hours before a vulnerability is exploited. IT managers are being put under pressure to promptly patch their production systems which conflicts with best practices of quality assurance testing.

Read More

QRadar Technical Blog: To Flow Or Not To Flow

QRadar began life as a network product, converted to an event log management tool and is now returning to its roots with QRadar Network Insights (QNI).

Read More

Types of Cyber Attacks To Look Out For

This blog is going to be short and sweet, but informative for anyone that is new to the cyber field or needs a recap.

Read More

SecurityCenter – Speedier Remediating

A Verizon Data Breach Report release always brings with it a wealth of information regarding industry trends towards the discovery of vulnerabilities and how fast organisations are able to act once they have been discovered; and this year is no different.

Read More

An Introduction To Automatic Transfer Systems (ATS)

A fairly new and unfamiliar technique used by banking malware is Automatic Transfer Systems. This type of malware harvests financial information such as login credentials to bank websites. A couple of ways that this can be achieved is by Formgrabbing and Webinjection. I’ll give a brief overview of what these two types of malicious activity entails.

Read More

NHS Needs “Massive” Investment In Cybersecurity Warn Experts

Early May NHS bosses and government faced questions over why their hospitals were left vulnerable to global cyber-attack “wannacry”. NHS faced days of disarray after the attackers demanding a ransom intruded the health services computer systems.

Read More

Variants OF Petya Ransomware Spreading With EternalBlue

It has been reported that variants of Petya ransomware with worm-like capabilities is spreading. The ransomware leverages etenalblue exploit, genuine psexec or wmic with appropriate credentials for a quick spread.

Read More

Your KPI's At Work: Assurance Report Cards in SecurityCenter

One of the requests I get most often when discussing Vulnerability Management with our customers is how to properly track KPIs, SLAs and other business metrics. Most of us have to adhere to some kind of governance or tracking to ensure we meet our targets for discovery or remediation when it comes to vulnerabilities.

Read More

Pages