Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Registering Data for Detection

In our last blog, we looked at the impending EU GDPR legislation and what that could mean for several organisations should the guidelines not be met. Using DLP solution Digital Guardian, you are one step closer to being EU GDPR compliant. Here we will be explaining how to register data with Digital Guardian Network Appliance.

Read More

Tales from Vault7 - Part 1

The past week has seen a frenzied patching spree sweep across the cybersecurity vendors due to the release of ‘Vault 7’, putting aside the Orwellian similarities (irrespective of where you stand on the matter) the expose raises the critical concern – besides the impartiality of the Vulnerability Equities Process (VEP)1 - “how can we possibly hope to be secure whilst nation-states invest billions into hacking?“

Read More

Splunk Detecting Zero-Day Attacks - Use-Case

Zero-day attacks take full advantage of unknown weaknesses within software. The most common method of obtaining an initial gateway is via spear phishing emails with an enclosed malware payload. When the unsuspecting work employee opens the malicious email, the malware executes its payload onto the unpatched machine and will establish a command and control communication, this will then attempt to move laterally across the internal network accessing sensitive data.

Read More

Palo Alto Networks Completes Acquisition of LightCyber

SANTA CLARA, Calif., Feb. 28, 2017 /PRNewswire/ -- Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced its acquisition of LightCyber®, a privately held cybersecurity company that has developed award-winning, highly automated and accurate behavioral analytics technology. Under the terms of the agreement, Palo Alto Networks has acquired LightCyber for $105 million in cash.

Read More

MAC OSX - Macro Based Malware

Mac users are always prompted to enable macros so this new vulnerability found in macOS will most likely have a success rate if users fall for it. Users can be targeted anytime, similar to why Ransomware has become so successful.

Read More

First Month Without Patches?

February? The first month without a patch release from Microsoft. Has Microsoft stopped releasing patches?

Read More

QRadar - Managing Reference Data

One of our QRadar Security Engineers takes you through managing reference data prior to the release of QRadar 7.2.8.

Read More

Splunk And Your Logs - Who Is That IP?

If you’re using Splunk already, it’s a fair assumption that you’re currently investigating some form of network access logs. Whether that’s from your edge firewalls or some sort of IDS or IPS, email or web filtering gateway, a proxy, a wireless access point or any other form of Internet facing system. Somewhere within your Splunk instance you will be seeing public IP addresses of locations that someone or something within your network is trying to get out.

Read More

Thing I Love - Coffee, Compliance (And Free Stuff)

Here’s something about me you might not know; there are several things I love: coffee and motorsport, port & Cheese, chocolate cheesecake, and free stuff that’s actually useful! And here’s one that you might have thought is a useful toy, but can actually be an important and integral part of your e-policy compliance audit toolkit.

Read More

How Your Trade Secret Can Be Leaked

A new precedent is being seen across borders worldwide – handing over your smart phone to airport security. When a US born NASA scientist Sidd Bikkannavar was pressured into giving his NASA owned smart phone and PIN code across to Border Patrol agents - who consequently vanished for thirty minutes with both pieces of information – until he was free to leave.

Read More

Pages