Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

SIEMONSTER OVERVIEW

If you are not too clued up on what a SIEM is and how it works have a read below. SIEM’s are becoming very popular with a lot of big companies adopting the solution to manage their IT security.

Read More

DDoS Attack Explained

DDoS implies Circulated Refusal of Administration and it happens when an assailant overpowers an objective, that is for the most part a server, with a heap of activity that the objective can't oversee. DDoS is an uncommon sort of DoS, Distributed denial of service, and it is critical to see the contrast between them.

Read More

What's New in Splunk 7.0

Way back in the end of September, Splunk quietly did a major version bump of their core product, Splunk Enterprise to version 7.0. Several new features come built into this new version to enable enhanced searching and reporting in many ways, so while the overall feel of Splunk remains much the same as 6.x the underlying power has been greatly improved. In this article we will cover some of the new features and how to use them successfully in your environment.

Read More

Tenable Allows Least Privilege SSH Scans

Credentialed scans have long been encouraged as the quickest and most accurate way to perform a vulnerability assessment against any network. However, customer always run into problems which are related to users or process which need to be followed.

Read More

Tips to Secure Your Network and Reduce The Chance of Being Hit By KRACK

A vulnerability has recently been discovered named KRACK. It targets the link between your device and the Wi-Fi access point, i.e. a router either in your home or office. The following tips can help to improve the security of your connection.

Read More

Free Tools: Secue Password Generator

There’s many a time you’re required to come up with a secure password at short notice, and there are many tools to do this. There is a vendor in firmly entrenched in the password security market who has made a powerful yet flexible password generator that also guarantees the privacy of your newly generated password.

Read More

New Memory bug for Apache servers - Optionsbleed

These days’ hackers are trying to find persistence way of hacking the web application and the web server, now apache servers that are a bit older versions are a recent hit in terms of vulnerabilities.

Read More

QRadar User Behavioural Analytics App (UBA) version 2.2.0

With the development of the UBA App Extension, IBM is providing a very useful method of exposing a wide variety of user activities that may be fraudulent or malicious.

Read More

QRadar Use Case Series: Part 3: Data Exfiltration Attempt Through Online Storage

Welcome back to the IBM QRadar use case series. I am going to give ‘User Activity Monitoring’ a break for some time and focus this particular post on ‘File Activity Monitoring’. Although, not that dissimilar, we are identifying trends around directories and in particular files.

Read More

The KRACK Wi-Fi Security Weakness

Security researches this week discovered a serious vulnerability in WPA2, WPA2 (short for Wi-Fi Protected Access II) is a security standard that secures all modern protected Wi-Fi networks. Mathy Vanhoef of imec-DistriNet discovered and published a flow in WPA2 that allows anyone to break this protocol and intercept data communicating between your wireless device and the wifi network. This could be your photos, passwords, messages and so forth.

Read More

Pages