Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Three Cybersecurity Hurdles We Must Overcome in 2017

Every month, cyber attacks seem to whiplash back to center stage. There are dozens of headlines at any given moment that should be catalysts for cybersecurity change. But things do not change and, in fact, they may be getting worse.

Read More

New Year, New Security Challenges: What to Expect from 2017

Trend Micro has been protecting organisations, governments and consumers for over two and a half decades now. Our 1,200-strong team of threat researchers work round the clock and around the globe to anticipate where the next major threats will come from, and, crucially, how to mitigate them. At this time of year we’re always asked for our predictions for the next 12 months. And while cybercriminals are unlikely to work to annual deadlines, it’s still a good time to take stock and share our insight into what our experts think 2017 holds in store.

Read More

What's In a Name: Why We're Changing Our Name (and More) In 2017

In the timeless classic Romeo and Juliet, Shakespeare wrote, “What’s in a name?”. This famous line implies that names are simply labels that don’t really matter. After all, Juliet posits, “A rose by any other name would smell as sweet. It’s a nice sentiment, but perhaps (like Juliet) a bit naïve. If a rose were called skunk weed, you would expect a very different experience when you smelled it. And as Romeo and Juliet’s tragic tale demonstrates, names can unite or divide us. Names matter. So what does this have to do with Shavlik?

Read More

DailyMotion Hacked - 85 Million User Accounts Stolen

Another day, another data breach. This time a popular video sharing platform DailyMotion has allegedly been hacked and tens of millions of users information have been stolen.

Read More

Name That User: LightCyber Finds Attackers by Triangulating Users, Devices, and Network Traffic

Finding active attackers in a network requires a high degree of precision. To maximize detection accuracy, LightCyber Magna monitors user access—as well as network and endpoint activity—to build a baseline of normal behavior. Since every user is unique, LightCyber profiles each user individually.

Read More

It's Time To Replace Your Antivirus

In recent weeks, we’ve written on some pretty timely and interesting topics. We first discussed the ineffectiveness of traditional antivirus, which catches less than half of noteworthy malicious events. We then introduced, defined, and discussed Next-Generation Antivirus (NGAV), the natural (and much needed) evolution of AV that protects computers from the full spectrum of modern cyber attacks.

Read More

TrapX Security Recognised by Best in Biz Awards for Second Consecutive Year

TrapX™, a global leader in advanced cybersecurity defense, today announced the TrapX DeceptionGrid has been selected as an Enterprise Software Product of the Year by the Best in Biz Awards for a second consecutive year.

Read More

What Are Unknown Cyber Threats? (And Are They Really Unknown?)

Unknown and zero-day threats are not the same thing. There are many ways that they are created. Learn about the types, how to turn them into known threats, and protect yourself. Most traditional security products are built to act based on known threats. The moment they see something that is known to be malicious, they block it. To get past security products that successfully block known threats, attackers are forced to create something that is previously unknown. How do they do it, and what can we do to prevent both known and unknown threats?

Read More

FireEye Announces Helix -- the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations

FireEye, Inc, the intelligence-led security company, today introduced FireEye® Helix™, a platform to simplify, integrate, and automate security operations for organizations of all sizes and industries. This intelligence-led platform unifies network, endpoint and third-party product visibility with industry leading FireEye iSIGHT® Intelligence and Mandiant® expertise.

Read More

5 Steps For Adopting Privileged Local Account Auditing Best Practices

STEALTHbits has over a decade of experience helping customers understand how administrative access has been granted to their desktop and server infrastructure, and who effectively has these highly privileged access rights. This blog outlines a 5-step process you can follow to bring your systems back under centralized control. It also highlights key reports that provide even deeper insight into critical system-level configurations and conditions that attackers exploit in almost every breach scenario.

Read More

Pages