Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

QRadar Technical Blog: HA and DR

People often question whether to use High Availability (HA) or Disaster Recovery (DR). In our view this is not really a valid question. The two techniques address different issues and probably the choice of “HA or DR” should be re-defined as “HA and DR”.

Read More

Protect your crown jewels – hardening access to Thycotic Secret Server

So, you have invested time and resource into Thycotic’s flagship product, Secret Server, in the understanding that all your privilege account information is secretly buried away, highly encrypted in a highly available MS-SQL cluster, redundant across all 5 continents.

Read More

A brief point on double standards…

Whilst trawling the internet for the topic for a blog I came across a fascinating POC attack for a method in which a user could payload Microsoft excel/word documents without the use of a macro. This exploited an inbuilt MS office suite utility in order to run commands on an end-user machine.

Read More

Netflix Scan Emails

Netflix is a popular online movie streaming platform where millions of users take the benefit of this service. As we know the online scam is transforming into a complex stage where it’s hard to believe on company emails that comes in the inboxes.

Read More

An Introduction to the ELKeBMWSC(Tn) Stack

ELK Stack is currently the preferred stack of software for DIY logging. It has been compared to the likes of Splunk, offering the incentive of being open-source. The ELK Stack is initially composed of three software packs: Elasticsearch, Logstash & Kibana.

Read More

Effective Cyber Hygiene - Breach Defense using Web Application Scanning

If you have been paying attention to the news lately, the name Equifax will have been on most IT professional’s lips, for good reasons or bad. The primary point of entry for the attack and subsequent leak began with an Apache Struts vulnerability, which Tenable wrote about way back in March.

Read More

Splunk 7 "What's New"

Splunk Enterprise 7 new release marks “the end of meh-trics,” and delivers improvements in machine learning, as well as speed and scale improvements for analytics, monitoring and alerting.

Read More

The Thirst for Big Data

It’s the 2nd of October today – as I’m writing this blog the front page on BBC News Technology section is still the Equifax data breach. For those reading this who have been hiding under a rock over the past few weeks – Equifax are the latest in a seemingly ever extending list of companies which have had the contents of their customer databases surreptitiously extracted from their corporate network.

Read More

Deloitte Data Breach

Yet another company has been a victim of a cybersecurity breach. This is time it is an accounting giant Deloitte. Deloitte, which is one of the world’s big four accounting firm, made $37 billion in revenue through its services which include auditing, consulting, merger and ironically cybersecurity consulting.

Read More

Tackling An Unpatchable Vulnerability With Bromium

In a recent cybersecurity training course with Police Scotland, I asked the group what I thought was a slightly sneaky question "what does every organisation in the world have in common?". After a few technical answers along the lines of computers, internet, servers and others, one of the class simply said, people. “People” was the answer I was looking for and for the next 30 mins, we discussed how much of a pain people are when it comes to cybersecurity.

Read More

Pages