Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Satisnet Ltd New Partner: Darktrace

We are happy to announce today that we have partnered with Darktrace, the world leader in Enterprise Immune System Technology for cyber security.

Read More

The Answer To Today’s Risks

The IT Insider talked to cyber-security specialists Honeycomb Technologies about how businesses can arm themselves against modern day threats – maintaining control through automated and orchestrated security tasks.

Read More

SANS Names IBM QRadar As The Best SIEM For 2015

The QRadar team at IBM Security was delighted to see IBM Security QRadar named as the winner of the 2015 SANS Best SIEM Award. Every year, the SANS Institute surveys its more than 200,000 hands-on security practitioners, most of whom use commercial products, and publishes what the community likes best.

Read More

Attack: Best Form Of Defense From The IT Insider

The IT Insider talks to Satisnet about CyberKombat – a brand new experience designed to replicate a serious cyber-attack on an organisation, giving security teams the opportunity to test their abilities in a real life situation.

Read More

Tenable Network Security Wins SANS Best of 2015 Award for Vulnerability Assessment

In addition to the SANS Best of 2015 Award, Nessus has been recognized by Security magazine as a “Top 20 Security Product of the Last 20 years.” Tenable has earned numerous product excellence awards over the last year, including recognition’s from SC Magazine, Network World Asia and Frost & Sullivan. The company was also named one of the fastest growing technology companies for the seventh consecutive year by the Deloitte Fast 500 program.

Read More

New Year, New Habits, New Preparation

Often times in security, an “incident” becomes a catalyst for change, but why wait for something bad to happen? The inevitability of compromise is very real in today’s threat landscape. It’s become almost cliché for us to say: “it’s not a matter of if, but when an attack will occur,” but there is a significant amount of truth to that statement.

Read More

5 key considerations for understanding insider threats

Even a trusted colleague or vetted third-party who has access to important documents and files can’t be overlooked in your organisation’s data security plans. They may not necessarily be concealing any malicious intent, but it is entirely possible that one of them could accidentally release data to unauthorised users or mistakenly share a file that should have been left private.

Read More

Older IE versions set to become prime targets as Microsoft ends support today

Today is the official end-of-life date for any version of IE older than the latest available for the version of Windows you are running. Microsoft told us in the original life-cycle announcement which version will be supported for each OS. After the January Patch Tuesday release there will be no security updates unless you are on the supported version for that OS.

Read More

DeceptionGrid from TrapX Security detects a human attacker in real-time

A couple of weeks ago, Global Industrial, Inc. (not their real name) scheduled a proof of concept (POC) with TrapX Security to evaluate the company’s DeceptionGrid product. It just so happened that the POC ran at the same time that Global Industrial underwent their quarterly penetration testing.

Read More

5 measures your organisation should take to dramatically reduce the risk of being hacked

After an attack has occurred, it is usually possible to thoroughly analyse a hackers attack modus operandi by decoding their malware source-code and tracing their command and control infrastructure. Furthermore, public and private “hackathon” events reveal that many hackers are very comfortable to share the details of their hacking analytical approach, coding strategies, actual code libraries and attack scenarios.

Read More

Pages