Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Edinburgh Napier University and Satisnet open a cyber lab to help counter security threats for staff and students

The centre will train people in tackling ransomware, data loss and comes ahead of new GDPR rules in May

Read More

Tenable Pledges to Fight Global Cyberattacks with 33 Leading Companies

In today’s digital economy, it has become paramount for companies to defend customers from malicious attacks by criminal enterprises and nation states.

Read More

Tenable Unveils Industry's First Cyber Exposure Benchmarking Solution

Tenable®, Inc., the Cyber Exposure company, today unveiled Tenable.io™ Lumin, a new Tenable.io application that for the first time empowers CISOs to confidently visualize, analyze and measure their organization’s Cyber Exposure.

Read More

Funding secured to develop high level cybersecurity course

The University of Wolverhampton has secured £192,000 to develop cybersecurity courses in support of the Industrial Strategy.

Read More

SOCAutomation IBM App

IBM’s inclusion of apps over the past few releases of QRadar has significantly increased the old saying of a ‘a single pane glass view’. Having the ability to view core infrastructure tooling from the SIEM will enable not only SOC analysts but SIEM administrators to view the data which has been sent via these point solutions and then enable the user to view the source of those events.

Read More

Tenable - Host Discovery Option

Tenable scan policies consist of plugin settings and advanced commands used during the scan process. Scan policies can be created by users within the Tenable application. Within Tenable’s scanning products. E.g. Nessus, SecurityCenter and Tenable.io there is a range of default policies which can be used.

Read More

Extra resources for vulnerability scanning with Tenable

Having a vulnerability scanner like Tenable.io or SecurityCenter is a crucial part of your internal security practices, but so often I hear our customers asking for additional help with understanding or interpreting scan results, or building actionable reports for their business.

Read More

AIOPS is here! What can it do?

You might be reading the term artificial intelligence for IT operations (AIOps) and wondering to yourself what it is and what it can do.

Read More

XSS Web Application Vulnerability

XSS (short for Cross-Site Scripting) is a well-known vulnerability that affects many web applications. The risk behind XSS is that it allows an attacker to inject content into a website and modify how it is displayed, making a victim’s browser to execute the code provided by the attacker while loading the page.

Read More

Three Steps to Monitor Cloud Services Usage

Are you using cloud services and don’t know why they are slow or how much data is transferred? The answers are in Flowmon.

Read More

Pages