Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

What is IBM Security App Exchange & A Look At Carbon Black's Response App

This series of blogs has been created with the intention of shedding some light on a still rather underused area of the IBM X-Force Exchange, and that is the Security App Exchange. The Security App Exchange has a whole host of applications that add a significant amount of helpful functions and content into three of IBMs most prevalent security solutions, QRadar, BigFix and X-Force Exchange.

Read More

New Manoeuvres to Deliver Ransomware and Avoid Anti-Virus Detections

In the modern age, groups of anonymous hackers are utilising new tactics to deliver and compromise remote target systems. The traditional system of using email attachments as a way to distribute these tactics is still being widely used, and considered to be the main way of targeting victims.

Read More

QRadar Use Case Series: Part 1 - User Activity Monitoring - Employee Probation

In this series of use case scenarios using IBM QRadar SIEM, we will look at a set of key log sources which are required for a successful deployment. These log sources although not glamorous are embedded into all companies, forming the backbone of most organisations security posture.

Read More

British Telecom Signs Up Trend Micro to Strengthen Security In The Cloud

Leading providers of communications services and solutions British Telecom and Trend Micro, a global leader in cyber-security solutions on Thursday announced immediate availability of Trend Micro's Deep Security data centre solution on BT's Cloud Compute platform.

Read More

From Cyber Propaganda to IoT botnets: Strap yourself in for a rocky 2017

It’s that time of the year again: when the great and good of the cybersecurity industry reach for their crystal balls to anticipate what the threat landscape might look like in the next 12 months. We all know cybercriminals by and large don’t operate to annual deadlines.

Read More

More Security Predictions: 2017 Will be a Mixed Bag

The last several years have all been known for high profile data breaches, and 2016 was no different. Some very well-known names, including government agencies, fell victims to cyber-attacks. If there is a silver lining in all this, it is that these data breaches have increased awareness and forced organizations to advance their security practices to better fight cyber-threats. At WhiteHat, we believe that these trends will continue into 2017; we expect the coming year to be a mixed bag of good and bad news. Listed below are our top security predictions for 2017.

Read More

Optimising Your Data Governance Strategy For EU GDPR

Here are some strategies savvy organizations are implementing to detect and prevent the sort of breaches that can cost up to 4% of gross revenue under GDPR.

Read More

Protecting passwords prevents hackers priveledged passage

Human frailty is the cause of many of the worst cyber security lapses, making passwords the Achilles heel of even the best access control systems.

Read More

Don’t Let Your Users Unknowingly Be the Weak Link in Your Security Infrastructure

Hackers are becoming increasingly stealthy and creative, relentlessly trying to gain access to sensitive data, while organizations work tirelessly to prevent security breaches and data theft. In this complex game of cat and mouse, security practitioners are being forced to rethink how they identify and control traffic on the network, shifting to an application-focused approach, rather than port- and protocol-based policy, to defend against successful cyberattacks and uphold business integrity.

Read More

Critical Infrastructure Q&A with National Security Strategist Eric O' Neil

As Carbon Black’s national security strategist, Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters. He is a practicing attorney who specializes in cyber-security vulnerability assessments, counterintelligence and counter terrorism operations, investigations into economic espionage, internal investigations and security risk assessment consulting.

Read More

Pages