Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

QRadar Use Case Series: Part 1 - User Activity Monitoring - Employee Probation

In this series of use case scenarios using IBM QRadar SIEM, we will look at a set of key log sources which are required for a successful deployment. These log sources although not glamorous are embedded into all companies, forming the backbone of most organisations security posture.

Read More

British Telecom Signs Up Trend Micro to Strengthen Security In The Cloud

Leading providers of communications services and solutions British Telecom and Trend Micro, a global leader in cyber-security solutions on Thursday announced immediate availability of Trend Micro's Deep Security data centre solution on BT's Cloud Compute platform.

Read More

From Cyber Propaganda to IoT botnets: Strap yourself in for a rocky 2017

It’s that time of the year again: when the great and good of the cybersecurity industry reach for their crystal balls to anticipate what the threat landscape might look like in the next 12 months. We all know cybercriminals by and large don’t operate to annual deadlines.

Read More

More Security Predictions: 2017 Will be a Mixed Bag

The last several years have all been known for high profile data breaches, and 2016 was no different. Some very well-known names, including government agencies, fell victims to cyber-attacks. If there is a silver lining in all this, it is that these data breaches have increased awareness and forced organizations to advance their security practices to better fight cyber-threats. At WhiteHat, we believe that these trends will continue into 2017; we expect the coming year to be a mixed bag of good and bad news. Listed below are our top security predictions for 2017.

Read More

Optimising Your Data Governance Strategy For EU GDPR

Here are some strategies savvy organizations are implementing to detect and prevent the sort of breaches that can cost up to 4% of gross revenue under GDPR.

Read More

Protecting passwords prevents hackers priveledged passage

Human frailty is the cause of many of the worst cyber security lapses, making passwords the Achilles heel of even the best access control systems.

Read More

Don’t Let Your Users Unknowingly Be the Weak Link in Your Security Infrastructure

Hackers are becoming increasingly stealthy and creative, relentlessly trying to gain access to sensitive data, while organizations work tirelessly to prevent security breaches and data theft. In this complex game of cat and mouse, security practitioners are being forced to rethink how they identify and control traffic on the network, shifting to an application-focused approach, rather than port- and protocol-based policy, to defend against successful cyberattacks and uphold business integrity.

Read More

Critical Infrastructure Q&A with National Security Strategist Eric O' Neil

As Carbon Black’s national security strategist, Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters. He is a practicing attorney who specializes in cyber-security vulnerability assessments, counterintelligence and counter terrorism operations, investigations into economic espionage, internal investigations and security risk assessment consulting.

Read More

Trend Micro Named as a Leader in IDC MarketScape on Worldwide Email Security

Trend Micro™ a global leader in cybersecurity solutions, has been named a Leader in the IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment

Read More

It May Be Winter, but LANDESK is Heating Up by Joining Forces with HEAT Software

In case you haven’t heard, Clearlake Capital has signed a definitive agreement to acquire LANDESK from Thoma Bravo. As part of the transaction, Clearlake will contribute its portfolio company HEAT Software to the new platform investment in LANDESK.

Read More

Pages