Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

How to take control of the ransomware problem

When will we be finally rid of ransomware? I imagine CISOs up and down the land repeat the same question most every day. Because it’s on a near daily basis we hear of yet another new variant causing havoc around the world. Most recently, reports have focused on new strains being offered “as-a-service” for non-technical cybercriminals to disseminate, ensuring the outbreak has now reached epidemic proportions. The truth is that until all organisations start refusing to pay the ransom, and/or get better at security basics, there’ll always be enough profit to keep the black hats interested.

Read More

Is Mr.Robot in Your Network

In Season 2 Episode 6 of Mr. Robot, Darlene and Angela continue with infiltration of the FBI and E-Corp, while Elliot is otherwise detained. Because Angela must plant the femtocell in E-Corp, members of F-Society help her learn the commands that are needed. They also offer an alternative called a “Rubber Ducky,” a USB device that registers itself as a Human Interface Device (HID) or keyboard. Since all systems trust HIDs, they are able to bypass policies that don’t allow USB storage devices. However, the infiltration plan is executed as planned with the femtocell device.

Read More

Lessons in Code Recyling from Pokemon Go

As seen in the SD Times, good programmers write good code, but great programmers DO steal. And reuse. And recycle.

Read More

Vulnerability Management with Nessus in the Cloud

Regardless of whether you’re running applications and storing data in a physical, virtual or cloud environment (or a hybrid mix), a key responsibility for you as a security professional is to keep that environment free from vulnerabilities that attackers could use to get at your organisation’s applications and data.

Read More

Do you know your patch management posture?

How well do you know the security posture of your environment? Do you know how effective your Patch Management process is? Can you provide stakeholders with a quick look at the state of your network and show how protected you are in real time?

Read More

3 POS Security Recommendations Following the Oracle MICROS Breach

As first reported by Brian Krebs, “a Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant Oracle Corp.” According to the report, “the attackers compromised a customer support portal for companies using Oracle’s MICROS point-of-sale credit card payment systems.” The breach comes…

Read More

QRadar Use Case Demo's

This blog post contains a very useful list of IBM QRadar Use Cases

Read More

Just What the doctor ordered: Trend Micro Takes The Hassle Out of Security For New CyberAid Program

When it comes to healthcare security, media attention is usually focused on the mega breaches – think Anthem, Premera and, most recently, Banner Health. But there is a long tail of smaller organizations who also need help. That’s where the Health Information Trust Alliance (HITRUST) has expanded its focus. Its latest initiative, CyberAid, is designed specifically to help smaller healthcare organizations protect themselves from ransomware, data breaches and other major threats.

Read More

IoT Devices in the Network: Can You Find Them?

In the last year or so, the topic of Internet of Things (IoT) received a lot of attention. Both the concept of the topic and scope of what should be included in IoT changed dramatically in that time. The first commercialization of IoT were wearables such as GoogleGlass. Shortly thereafter came the next wave, with devices such as smart watches. The first security concerns were focused on personal safety due to user distractions, similar to those voiced when smartphones became popular, and then came the invasion of privacy concerns. However, shortly after the first hackers got hold of them and identified attacks to gather data from them. At that point, the view on IoT expanded to recognize that the concept of IoT was actually much broader and had more significant impacts than privacy.

Read More

Fast Company: This Security Company Based Its Tech On The Human Immune System

The program coordinator at the Catholic Charities of Santa Clara County in California never suspected that an email she received earlier this year contained anything more than the corporate invoice it claimed. But as soon as she opened the attachment, malware began to encrypt data on her computer. The breach threatened to expose far more than just her personal files: In order to provide its customers with health care, immigration assistance, and other social services, Catholic Charities handles the medical and financial records of more than 54,000 people each year. Of all the cybersecurity systems—including firewalls and antivirus software—that the nonprofit had in place to shield those sensitive documents, only one flagged the intrusion.

Read More

Pages