Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

More Security Predictions: 2017 Will be a Mixed Bag

The last several years have all been known for high profile data breaches, and 2016 was no different. Some very well-known names, including government agencies, fell victims to cyber-attacks. If there is a silver lining in all this, it is that these data breaches have increased awareness and forced organizations to advance their security practices to better fight cyber-threats. At WhiteHat, we believe that these trends will continue into 2017; we expect the coming year to be a mixed bag of good and bad news. Listed below are our top security predictions for 2017.

Read More

Optimising Your Data Governance Strategy For EU GDPR

Here are some strategies savvy organizations are implementing to detect and prevent the sort of breaches that can cost up to 4% of gross revenue under GDPR.

Read More

Protecting passwords prevents hackers priveledged passage

Human frailty is the cause of many of the worst cyber security lapses, making passwords the Achilles heel of even the best access control systems.

Read More

Don’t Let Your Users Unknowingly Be the Weak Link in Your Security Infrastructure

Hackers are becoming increasingly stealthy and creative, relentlessly trying to gain access to sensitive data, while organizations work tirelessly to prevent security breaches and data theft. In this complex game of cat and mouse, security practitioners are being forced to rethink how they identify and control traffic on the network, shifting to an application-focused approach, rather than port- and protocol-based policy, to defend against successful cyberattacks and uphold business integrity.

Read More

Critical Infrastructure Q&A with National Security Strategist Eric O' Neil

As Carbon Black’s national security strategist, Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters. He is a practicing attorney who specializes in cyber-security vulnerability assessments, counterintelligence and counter terrorism operations, investigations into economic espionage, internal investigations and security risk assessment consulting.

Read More

Trend Micro Named as a Leader in IDC MarketScape on Worldwide Email Security

Trend Micro™ a global leader in cybersecurity solutions, has been named a Leader in the IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment

Read More

It May Be Winter, but LANDESK is Heating Up by Joining Forces with HEAT Software

In case you haven’t heard, Clearlake Capital has signed a definitive agreement to acquire LANDESK from Thoma Bravo. As part of the transaction, Clearlake will contribute its portfolio company HEAT Software to the new platform investment in LANDESK.

Read More

Tenable Welcomes Amit Yoran as Chairman and CEO

Tenable has announced that Amit Yoran, president of RSA, will be their new Chairman and CEO, effective January 3, 2017. They are honored to welcome one of the security industry’s most esteemed leaders and visionaries to their team.

Read More

It's Time to Up Cyber Maturity Levels in 2017 - Starting with the Endpoint

As we close out another eventful year one thing is patently obvious: cyber threats have never represented a bigger risk to firms. Data and security breaches recently revealed at the likes of PayAsUGym, Ryanair, Lynda.com, KFC and more have all provide a timely festive reminder to CISOs of the value of multi-layered threat defence. More concerning still are new stats suggesting UK firms continue to operate with lower levels of security maturity than their US counterparts.

Read More

Why Defence in Depth Should be Key for All CISOs Heading into 2017

The evolution of the threat landscape is a tricky thing to predict. After all, the nation states, cybercrime gangs and lone hacktivists we track always have the advantage of surprise.

Read More

Pages