Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Your KPI's At Work: Assurance Report Cards in SecurityCenter

One of the requests I get most often when discussing Vulnerability Management with our customers is how to properly track KPIs, SLAs and other business metrics. Most of us have to adhere to some kind of governance or tracking to ensure we meet our targets for discovery or remediation when it comes to vulnerabilities.

Read More

Tenable SecurityCenter & Thycotic Secret Server: Enterprise Class Scan Credential Management

If you are a Security Center user, you’ll be pleased to hear that Tenable have integrated on-demand credential retrieval from Thycotics flagship PAM product, Secret Server!

Read More

Ransomware... One More Time

Following on from the previous blog “Carbon Black (CB) “More on WannaCry” I thought it would be a good idea to go over Ransomware and list some key information surrounding this type of malware. (Would have been an idea to write this before the last blog but needs must be met when everyone is talking about one specific type) So for you guys that are still unsure how Ransomware works here goes. (Warning: This maybe too basic for most but awareness is key ☺)

Read More

Satisnet at InfoSecurity Europe 2017

So InfoSecurity Europe 2017 is over and it’s certain that London Olympia was once again packed with cyber security professionals and there was more invaluable content across the stages and throughout the show!

Read More

Five Valuable Tips to Take-Away For Ransomware Protection

The way that WannaCry spreads is by SMB using a vulnerability found within Microsoft Windows. Microsoft addressed the vulnerabiolity by releasing a new patch with the reference name of MS17-010 back in March. Organisations still had not updated their systems, and therefore had been exploited via the weakness in their defences. Once it infects the network, WannaCry encrypts all files it has access to and attempts to delete all shadow copies, making affected files even more difficult to recover.

Read More

QRadar Technical Blog: Using QRadar to check for WCry

After the events of the last few weeks you might wish to protect your network against a second invasion of the WannaCry malware. By all accounts the next instance may well be nastier than the first.

Read More

Useful Steps To Avoid The Ransomware Attacks Within A Production Environment

This blog takes us through some simple steps suggested by one of the leading cyber-security firms to escape ransomware attacks

Read More

Carbon Black (CB) "More on WannaCry"

Continuing from the last blog, Carbon Black Defense “Put to the test”. Most of the world has heard or experienced WannaCry.

Read More

Eternal Rocks To Use Seven Exploits in Comparison to WannaCry's Two

Cybersecurity researchers have discovered a new exploit which uses seven of the NSA’s leaked exploits. “EternalRocks”, a new malware, uses the exploits first discovered by the National security agency, experts are describing this malware as “doomsday” which can strike anytime.

Read More

QRadar Technical Blog: Suggested Deployment

After the last blog regarding the use of data nodes, there has been a request for suggestions around how the deployment should look. First we should say that there are many ways of deploying QRadar and while there are certainly some wrong ways, there are many ‘right’ ways each depending upon the size of network, number of devices, activity and other metrics.

Read More

Pages