Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Older IE versions set to become prime targets as Microsoft ends support today

Today is the official end-of-life date for any version of IE older than the latest available for the version of Windows you are running. Microsoft told us in the original life-cycle announcement which version will be supported for each OS. After the January Patch Tuesday release there will be no security updates unless you are on the supported version for that OS.

Read More

DeceptionGrid from TrapX Security detects a human attacker in real-time

A couple of weeks ago, Global Industrial, Inc. (not their real name) scheduled a proof of concept (POC) with TrapX Security to evaluate the company’s DeceptionGrid product. It just so happened that the POC ran at the same time that Global Industrial underwent their quarterly penetration testing.

Read More

5 measures your organisation should take to dramatically reduce the risk of being hacked

After an attack has occurred, it is usually possible to thoroughly analyse a hackers attack modus operandi by decoding their malware source-code and tracing their command and control infrastructure. Furthermore, public and private “hackathon” events reveal that many hackers are very comfortable to share the details of their hacking analytical approach, coding strategies, actual code libraries and attack scenarios.

Read More

5 ways Copy Data Virtualisation from Actifio could save your business money in 2016

You’re no doubt familiar with server virtualisation and network virtualisation, but have you ever considered virtualising your data? Once concepts that seemed bizarre, server and network virtualisation brought a number of benefits for the users who chose to adopt them, eventually going on to become common practice in today’s enterprise IT departments.

Read More

Predictions for IT Security in 2016 from Certes Networks

The frequency and severity of data breaches has steadily increased in recent years, which serves as a clear indication that organisations still have a lot of work to do if they are solve their security problems. This is particularly concerning for organisations who store not only their corporate data, but also a host of personally identifiable information. It is also of great concern to organisations who maintain critical infrastructures.

Read More

Cybercriminals compete through customer support and guarantees

Hacking was once the domain of extremely tech-savvy experts, but in recent years it has evolved into a diverse market complete with industry verticals, specialisations and intense competition that sees groups who aren’t willing to adapt fall by the wayside as more dynamic services take their place.

Read More

If your network visibility is below standard, your security probably is too

It’s surprising how many businesses have IT and security staff making critical security decisions based on little or no up-to-date information. Auditors view the documented policies and can see that vulnerability scans and penetration testing are taking place. Management reads the audit reports and hears that everything is in order on the network because IT says so. Yet organisations are still becoming victims of attacks from both the inside and outside.

Read More

The power of App-ID in Palo Alto Networks next-generation firewall

App-ID is a critical feature of the next-generation firewall from Palo Alto Networks. In fact, the company believes it is one of the features that lead to the market’s acceptance of next-generation firewalls and established Palo Alto Networks as a clear leader.

Read More

Tripwire’s top tips for successfully implementing your security control

If you’ve discovered a security gap at your organisation, and you’ve found a possible solution together with the required funding, then you’re half way to successfully implementing a new security control. Here are some suggestions from Tripwire for actions you should consider to ensure the success of your project:

Read More

Which industry is at the top of the cybersecurity class?

Tenable’s inaugural Global Cybersecurity Assurance Report Card graded cybersecurity around the world by asking over 500 security professionals to grade their organisations’ ability to assess cyber security risks and to mitigate threats that can exploit those risks. The company awarded grades from a somewhat acceptable B- to a barely passing grade of D.

Read More

Pages