Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Want to break a DDoS record? It’s as easy as 62 user/passwords

On the 22nd of September 2016, Krebsonsecurity.com was taken offline for 4 days after being hit with a Distributed Denial of Service (referred to as ‘DDoS’ herein) attack. This was merely 6 days after being hit with a record 620Gbps – a new record attack.

Read More

QRadar Technical Blog: Adding Custom eMail formats

With the release of 7.2.6 the ability to create multiple eMail formats was implemented as an extension of the existing method for providing user-written versions.

Read More

New Year, New SPORA

A new form of ransomware has been detected on the security radar. It is known as SPORA, and as devastating as it is, it has some notable developed features that are quite impressive.

Read More

Containerisation: Why Traditional Security will End in Tears

Containerisation, which was once considered to be the ‘geek’s’ topic’, has now become a major focal point for the IT enterprise security team. It has also emerged as a preferred foundation of DevOps and an answer to many deep-rooted operational issues.

Read More

Why Do Businesses Need to Patch?

Patching. Why? A lot of IT administrators have the chore of patching both workstations and servers within their organisation. Then the IT administrators have to deal with machines rebooting and end users complaining that the machines are running slow, whilst the patch cycle runs. So, the real question is why do businesses need to even patch?

Read More

What is IBM Security App Exchange & A Look At Carbon Black's Response App

This series of blogs has been created with the intention of shedding some light on a still rather underused area of the IBM X-Force Exchange, and that is the Security App Exchange. The Security App Exchange has a whole host of applications that add a significant amount of helpful functions and content into three of IBMs most prevalent security solutions, QRadar, BigFix and X-Force Exchange.

Read More

New Manoeuvres to Deliver Ransomware and Avoid Anti-Virus Detections

In the modern age, groups of anonymous hackers are utilising new tactics to deliver and compromise remote target systems. The traditional system of using email attachments as a way to distribute these tactics is still being widely used, and considered to be the main way of targeting victims.

Read More

QRadar Use Case Series: Part 1 - User Activity Monitoring - Employee Probation

In this series of use case scenarios using IBM QRadar SIEM, we will look at a set of key log sources which are required for a successful deployment. These log sources although not glamorous are embedded into all companies, forming the backbone of most organisations security posture.

Read More

British Telecom Signs Up Trend Micro to Strengthen Security In The Cloud

Leading providers of communications services and solutions British Telecom and Trend Micro, a global leader in cyber-security solutions on Thursday announced immediate availability of Trend Micro's Deep Security data centre solution on BT's Cloud Compute platform.

Read More

From Cyber Propaganda to IoT botnets: Strap yourself in for a rocky 2017

It’s that time of the year again: when the great and good of the cybersecurity industry reach for their crystal balls to anticipate what the threat landscape might look like in the next 12 months. We all know cybercriminals by and large don’t operate to annual deadlines.

Read More

Pages