Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Lessons in Code Recyling from Pokemon Go

As seen in the SD Times, good programmers write good code, but great programmers DO steal. And reuse. And recycle.

Read More

Vulnerability Management with Nessus in the Cloud

Regardless of whether you’re running applications and storing data in a physical, virtual or cloud environment (or a hybrid mix), a key responsibility for you as a security professional is to keep that environment free from vulnerabilities that attackers could use to get at your organisation’s applications and data.

Read More

Do you know your patch management posture?

How well do you know the security posture of your environment? Do you know how effective your Patch Management process is? Can you provide stakeholders with a quick look at the state of your network and show how protected you are in real time?

Read More

3 POS Security Recommendations Following the Oracle MICROS Breach

As first reported by Brian Krebs, “a Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant Oracle Corp.” According to the report, “the attackers compromised a customer support portal for companies using Oracle’s MICROS point-of-sale credit card payment systems.” The breach comes…

Read More

QRadar Use Case Demo's

This blog post contains a very useful list of IBM QRadar Use Cases

Read More

Just What the doctor ordered: Trend Micro Takes The Hassle Out of Security For New CyberAid Program

When it comes to healthcare security, media attention is usually focused on the mega breaches – think Anthem, Premera and, most recently, Banner Health. But there is a long tail of smaller organizations who also need help. That’s where the Health Information Trust Alliance (HITRUST) has expanded its focus. Its latest initiative, CyberAid, is designed specifically to help smaller healthcare organizations protect themselves from ransomware, data breaches and other major threats.

Read More

IoT Devices in the Network: Can You Find Them?

In the last year or so, the topic of Internet of Things (IoT) received a lot of attention. Both the concept of the topic and scope of what should be included in IoT changed dramatically in that time. The first commercialization of IoT were wearables such as GoogleGlass. Shortly thereafter came the next wave, with devices such as smart watches. The first security concerns were focused on personal safety due to user distractions, similar to those voiced when smartphones became popular, and then came the invasion of privacy concerns. However, shortly after the first hackers got hold of them and identified attacks to gather data from them. At that point, the view on IoT expanded to recognize that the concept of IoT was actually much broader and had more significant impacts than privacy.

Read More

Fast Company: This Security Company Based Its Tech On The Human Immune System

The program coordinator at the Catholic Charities of Santa Clara County in California never suspected that an email she received earlier this year contained anything more than the corporate invoice it claimed. But as soon as she opened the attachment, malware began to encrypt data on her computer. The breach threatened to expose far more than just her personal files: In order to provide its customers with health care, immigration assistance, and other social services, Catholic Charities handles the medical and financial records of more than 54,000 people each year. Of all the cybersecurity systems—including firewalls and antivirus software—that the nonprofit had in place to shield those sensitive documents, only one flagged the intrusion.

Read More

Thycotic Leaps Past CyberArk and Other Competitors in CyberSecurity 500 Rankings

Secret Server solution leads way in Privileged Account Management solutions market. Thycotic are thrilled to announce that they have ranked No.18, ahead of companies such as CyberArk and ManageEngine on CyberSecurity Ventures' CyberSecurity 500 list.

Read More

In Choosing Between Humans and Machines, You Want 'All the Things!'

What’s your bet on the best approach to combating hackers? Are you betting on some kind of AI algorithm? Think big-data processing will win it? Or, are you putting your faith in creative human beings? Darpa’s answer is: “Yes! We want all the things!” And they’ve got the Red Team/Blue Team outcomes to prove it!…

Read More

Pages