Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Just What the doctor ordered: Trend Micro Takes The Hassle Out of Security For New CyberAid Program

When it comes to healthcare security, media attention is usually focused on the mega breaches – think Anthem, Premera and, most recently, Banner Health. But there is a long tail of smaller organizations who also need help. That’s where the Health Information Trust Alliance (HITRUST) has expanded its focus. Its latest initiative, CyberAid, is designed specifically to help smaller healthcare organizations protect themselves from ransomware, data breaches and other major threats.

Read More

IoT Devices in the Network: Can You Find Them?

In the last year or so, the topic of Internet of Things (IoT) received a lot of attention. Both the concept of the topic and scope of what should be included in IoT changed dramatically in that time. The first commercialization of IoT were wearables such as GoogleGlass. Shortly thereafter came the next wave, with devices such as smart watches. The first security concerns were focused on personal safety due to user distractions, similar to those voiced when smartphones became popular, and then came the invasion of privacy concerns. However, shortly after the first hackers got hold of them and identified attacks to gather data from them. At that point, the view on IoT expanded to recognize that the concept of IoT was actually much broader and had more significant impacts than privacy.

Read More

Fast Company: This Security Company Based Its Tech On The Human Immune System

The program coordinator at the Catholic Charities of Santa Clara County in California never suspected that an email she received earlier this year contained anything more than the corporate invoice it claimed. But as soon as she opened the attachment, malware began to encrypt data on her computer. The breach threatened to expose far more than just her personal files: In order to provide its customers with health care, immigration assistance, and other social services, Catholic Charities handles the medical and financial records of more than 54,000 people each year. Of all the cybersecurity systems—including firewalls and antivirus software—that the nonprofit had in place to shield those sensitive documents, only one flagged the intrusion.

Read More

Thycotic Leaps Past CyberArk and Other Competitors in CyberSecurity 500 Rankings

Secret Server solution leads way in Privileged Account Management solutions market. Thycotic are thrilled to announce that they have ranked No.18, ahead of companies such as CyberArk and ManageEngine on CyberSecurity Ventures' CyberSecurity 500 list.

Read More

In Choosing Between Humans and Machines, You Want 'All the Things!'

What’s your bet on the best approach to combating hackers? Are you betting on some kind of AI algorithm? Think big-data processing will win it? Or, are you putting your faith in creative human beings? Darpa’s answer is: “Yes! We want all the things!” And they’ve got the Red Team/Blue Team outcomes to prove it!…

Read More

Another Win for Deep Discovery: The Only Way to Keep Advanced Threats and Ransomware at Bay

The hacking of the Democratic National Committee by possible Russian state operatives may have dominated the news cycle over the past week or two. But the reality is that organisations of all size and in every sector are at risk from advanced malware. And there’s certainly no company out there that is completely safe from ransomware. Luckily the tools do exist to mitigate these risks, but how do you cut through the marketing hype to find the right ones?

Read More

Satisnet Ltd New Partnership Announcement: LightCyber

Satisnet Ltd are excited to announce our new partnership with LightCyber, a behavioural attack detection tool that was founded by cyber warfare experts to help security analysts answer one question: Would you know if an active attack was underway in your network?

Read More

Questions to Consider When Calculating Cost of Ownership in Security

There have been times in history when a certain force dominates the landscape. That is to say, when a nation dominates the world. Examples include Egypt, Persia, Rome, France, England, and the United States. Military history shows us that each time, these forces were able to dominate largely because of technology. They built a powerful technology that could be wielded…

Read More

One Year Free: SecurityCenter Subscription Offer to All McAfee MVM Customers

With Intel Security getting out of the vulnerability management space, now is a great time for all McAfee Vulnerability Manager (MVM) customers to make the switch to Tenable’s SecurityCenter.

Read More

Gartner EDR Report Highlights the Emergence of NGAV

In Gartner’s recent technological EDR assessment “Comparison of Endpoint Detection and Response Technologies and Solutions,” Cb Response was cited as the most talked about solution in the industry and achieved the best possible score in every category of its comparative analysis.

Read More

Pages