Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

It's Time to Up Cyber Maturity Levels in 2017 - Starting with the Endpoint

As we close out another eventful year one thing is patently obvious: cyber threats have never represented a bigger risk to firms. Data and security breaches recently revealed at the likes of PayAsUGym, Ryanair, Lynda.com, KFC and more have all provide a timely festive reminder to CISOs of the value of multi-layered threat defence. More concerning still are new stats suggesting UK firms continue to operate with lower levels of security maturity than their US counterparts.

Read More

Why Defence in Depth Should be Key for All CISOs Heading into 2017

The evolution of the threat landscape is a tricky thing to predict. After all, the nation states, cybercrime gangs and lone hacktivists we track always have the advantage of surprise.

Read More

Three Cybersecurity Hurdles We Must Overcome in 2017

Every month, cyber attacks seem to whiplash back to center stage. There are dozens of headlines at any given moment that should be catalysts for cybersecurity change. But things do not change and, in fact, they may be getting worse.

Read More

New Year, New Security Challenges: What to Expect from 2017

Trend Micro has been protecting organisations, governments and consumers for over two and a half decades now. Our 1,200-strong team of threat researchers work round the clock and around the globe to anticipate where the next major threats will come from, and, crucially, how to mitigate them. At this time of year we’re always asked for our predictions for the next 12 months. And while cybercriminals are unlikely to work to annual deadlines, it’s still a good time to take stock and share our insight into what our experts think 2017 holds in store.

Read More

What's In a Name: Why We're Changing Our Name (and More) In 2017

In the timeless classic Romeo and Juliet, Shakespeare wrote, “What’s in a name?”. This famous line implies that names are simply labels that don’t really matter. After all, Juliet posits, “A rose by any other name would smell as sweet. It’s a nice sentiment, but perhaps (like Juliet) a bit naïve. If a rose were called skunk weed, you would expect a very different experience when you smelled it. And as Romeo and Juliet’s tragic tale demonstrates, names can unite or divide us. Names matter. So what does this have to do with Shavlik?

Read More

DailyMotion Hacked - 85 Million User Accounts Stolen

Another day, another data breach. This time a popular video sharing platform DailyMotion has allegedly been hacked and tens of millions of users information have been stolen.

Read More

Name That User: LightCyber Finds Attackers by Triangulating Users, Devices, and Network Traffic

Finding active attackers in a network requires a high degree of precision. To maximize detection accuracy, LightCyber Magna monitors user access—as well as network and endpoint activity—to build a baseline of normal behavior. Since every user is unique, LightCyber profiles each user individually.

Read More

It's Time To Replace Your Antivirus

In recent weeks, we’ve written on some pretty timely and interesting topics. We first discussed the ineffectiveness of traditional antivirus, which catches less than half of noteworthy malicious events. We then introduced, defined, and discussed Next-Generation Antivirus (NGAV), the natural (and much needed) evolution of AV that protects computers from the full spectrum of modern cyber attacks.

Read More

TrapX Security Recognised by Best in Biz Awards for Second Consecutive Year

TrapX™, a global leader in advanced cybersecurity defense, today announced the TrapX DeceptionGrid has been selected as an Enterprise Software Product of the Year by the Best in Biz Awards for a second consecutive year.

Read More

What Are Unknown Cyber Threats? (And Are They Really Unknown?)

Unknown and zero-day threats are not the same thing. There are many ways that they are created. Learn about the types, how to turn them into known threats, and protect yourself. Most traditional security products are built to act based on known threats. The moment they see something that is known to be malicious, they block it. To get past security products that successfully block known threats, attackers are forced to create something that is previously unknown. How do they do it, and what can we do to prevent both known and unknown threats?

Read More

Pages