Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Press Release: Flowmon Partners with CyberKombat to Train Next Generation Security Experts

Flowmon Networks, a provider of network monitoring and security solutions, today announced the alliance with CyberKombat, an attack/defence experience training program designed to test and develop a security operations centre (SOC) teams’ response to an incident. This combination enables a hands-on experience between Flowmon and CyberKombat, hugely enhancing the capabilities of security teams.

Read More

Satisnet's Work With Macmillan Helps Towards Active Luton's Move More Programme

Satisnet Ltd have been fundraising for Macmillan Cancer for just over a year now and have raised a staggering £16,000! This has been raised from various fundraising tasks, Macmillan coffee mornings and participating in Macmillan's annual ball.

Read More

Windows 7 and 8.1 servicing changes

I have had this question come at me from a dozen directions today, so I thought I would provide my thoughts on these changes in a more consumable and easily shared format.

Read More

Protect against CryptoLocker Ransomware

Recently, attackers employing a CryptoLocker variant have been removing volume shadow copies on systems, disallowing the users from restoring those files and then encrypting the files for ransom. If a user cannot recover from backups, he/she is at the attacker’s mercy.

Read More

Effective Security Requires a Change in Mindest and the Protection Paradigm

If you were like most people, the news in 2015 kept getting worse and worse, when it came to yet another health care data breach that was discovered. Each time you thought that it couldn’t get much worse, it did. Now a massive health care data breach seems to be the norm. News reporters have been getting to the point of saying that breaking news would be when there is not some kind of major breach.

Read More

How to take control of the ransomware problem

When will we be finally rid of ransomware? I imagine CISOs up and down the land repeat the same question most every day. Because it’s on a near daily basis we hear of yet another new variant causing havoc around the world. Most recently, reports have focused on new strains being offered “as-a-service” for non-technical cybercriminals to disseminate, ensuring the outbreak has now reached epidemic proportions. The truth is that until all organisations start refusing to pay the ransom, and/or get better at security basics, there’ll always be enough profit to keep the black hats interested.

Read More

Is Mr.Robot in Your Network

In Season 2 Episode 6 of Mr. Robot, Darlene and Angela continue with infiltration of the FBI and E-Corp, while Elliot is otherwise detained. Because Angela must plant the femtocell in E-Corp, members of F-Society help her learn the commands that are needed. They also offer an alternative called a “Rubber Ducky,” a USB device that registers itself as a Human Interface Device (HID) or keyboard. Since all systems trust HIDs, they are able to bypass policies that don’t allow USB storage devices. However, the infiltration plan is executed as planned with the femtocell device.

Read More

Lessons in Code Recyling from Pokemon Go

As seen in the SD Times, good programmers write good code, but great programmers DO steal. And reuse. And recycle.

Read More

Vulnerability Management with Nessus in the Cloud

Regardless of whether you’re running applications and storing data in a physical, virtual or cloud environment (or a hybrid mix), a key responsibility for you as a security professional is to keep that environment free from vulnerabilities that attackers could use to get at your organisation’s applications and data.

Read More

Do you know your patch management posture?

How well do you know the security posture of your environment? Do you know how effective your Patch Management process is? Can you provide stakeholders with a quick look at the state of your network and show how protected you are in real time?

Read More

Pages