Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Tenable Network Security Wins SANS Best of 2015 Award for Vulnerability Assessment

In addition to the SANS Best of 2015 Award, Nessus has been recognized by Security magazine as a “Top 20 Security Product of the Last 20 years.” Tenable has earned numerous product excellence awards over the last year, including recognition’s from SC Magazine, Network World Asia and Frost & Sullivan. The company was also named one of the fastest growing technology companies for the seventh consecutive year by the Deloitte Fast 500 program.

Read More

New Year, New Habits, New Preparation

Often times in security, an “incident” becomes a catalyst for change, but why wait for something bad to happen? The inevitability of compromise is very real in today’s threat landscape. It’s become almost cliché for us to say: “it’s not a matter of if, but when an attack will occur,” but there is a significant amount of truth to that statement.

Read More

5 key considerations for understanding insider threats

Even a trusted colleague or vetted third-party who has access to important documents and files can’t be overlooked in your organisation’s data security plans. They may not necessarily be concealing any malicious intent, but it is entirely possible that one of them could accidentally release data to unauthorised users or mistakenly share a file that should have been left private.

Read More

Older IE versions set to become prime targets as Microsoft ends support today

Today is the official end-of-life date for any version of IE older than the latest available for the version of Windows you are running. Microsoft told us in the original life-cycle announcement which version will be supported for each OS. After the January Patch Tuesday release there will be no security updates unless you are on the supported version for that OS.

Read More

DeceptionGrid from TrapX Security detects a human attacker in real-time

A couple of weeks ago, Global Industrial, Inc. (not their real name) scheduled a proof of concept (POC) with TrapX Security to evaluate the company’s DeceptionGrid product. It just so happened that the POC ran at the same time that Global Industrial underwent their quarterly penetration testing.

Read More

5 measures your organisation should take to dramatically reduce the risk of being hacked

After an attack has occurred, it is usually possible to thoroughly analyse a hackers attack modus operandi by decoding their malware source-code and tracing their command and control infrastructure. Furthermore, public and private “hackathon” events reveal that many hackers are very comfortable to share the details of their hacking analytical approach, coding strategies, actual code libraries and attack scenarios.

Read More

5 ways Copy Data Virtualisation from Actifio could save your business money in 2016

You’re no doubt familiar with server virtualisation and network virtualisation, but have you ever considered virtualising your data? Once concepts that seemed bizarre, server and network virtualisation brought a number of benefits for the users who chose to adopt them, eventually going on to become common practice in today’s enterprise IT departments.

Read More

Predictions for IT Security in 2016 from Certes Networks

The frequency and severity of data breaches has steadily increased in recent years, which serves as a clear indication that organisations still have a lot of work to do if they are solve their security problems. This is particularly concerning for organisations who store not only their corporate data, but also a host of personally identifiable information. It is also of great concern to organisations who maintain critical infrastructures.

Read More

Cybercriminals compete through customer support and guarantees

Hacking was once the domain of extremely tech-savvy experts, but in recent years it has evolved into a diverse market complete with industry verticals, specialisations and intense competition that sees groups who aren’t willing to adapt fall by the wayside as more dynamic services take their place.

Read More

If your network visibility is below standard, your security probably is too

It’s surprising how many businesses have IT and security staff making critical security decisions based on little or no up-to-date information. Auditors view the documented policies and can see that vulnerability scans and penetration testing are taking place. Management reads the audit reports and hears that everything is in order on the network because IT says so. Yet organisations are still becoming victims of attacks from both the inside and outside.

Read More

Pages