Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

StealthINTERCEPT Update: WannaCRY Detection

STEALTHbits is aware of the widespread ransomware attack which is affecting organizations in multiple countries. The new ransomware attack known as WannaCRY (also known as WCry, WanaCrypt, WanaCrypt0r and Wana DeCrypt0r) is encrypting files and changing the extensions to: .wnry, .wcry, .wncry and .wncrypt.

Read More

Splunk Enterprise 6.6 Has Been Released

This blog release will cover the areas that we have experienced when exploring the latest version of Splunk. Within Splunks latest version, we have found that its easier than ever for a wide selection of administrators/users to leverage data sets, create dashboards, gather answers and share information. We have also experienced the improvements made with Indexer and Search Head clustering which makes the platform much more manageable at a large scale.

Read More

10 Steps To An Effective Ransomware Protection Strategy

In light of the recent widespread takedown of NHS systems by Wanna Decryptor 2 ransomware, at the forefront of many CISO’s thoughts this weekend will be how to protect their enterprise data against falling foul of the many varieties of ransomware available in the wild.

Read More

New Version of Shavlik Protect

Shavlik Protect 9.3 has finally been released, the product has had a overhaul and name change. The new name for Shavlik protect is now Ivanti Patch for Windows Servers v9.3.

Read More

5 Essential Steps to EU GDPR – Part 4: STEALTHbits Technologies, a logical fit for EU GDPR

In part three we discussed how no one person, organisation or vendor has ‘the’ silver bullet to GDPR compliance. What you need is an array of tools and people to address the many challenges ahead.

Read More

5 Essential Steps to EU GDPR – Part 3: Engage the Right People

This is arguably the most important element in achieving GDPR compliance. No organisation can do everything independently. Even software vendors must engage with outside agencies on this one. We’re going to discuss ‘the right people’ as two categories; Internal and External. If ever there was an all hands requirement in a project, this is it.

Read More

5 Essential Steps To EU GDPR - Part 2: GDPR, the Data Access Governance Project

In part one we looked at the questions organisations must address when dealing with DSARs (Data Subject Access Request). Simple questions, but in reality, tricky or virtually impossible to answer depending on the size and complexity of your data infrastructure. Saying that, they’re actually the core premise of Data and Access Governance.

Read More

5 Essential Steps To EU GDPR

Despite the GDPR being marked as a clearer to understand regulation, it’s still a mine field of legal and compliance requirements, interpretations and uncertainty. The purpose of this blog series is to help you understand the fundamental requirements of GDPR by peeling back the layers of legality, bureaucracy and spin.

Read More

WPcache-Blogger – Affects Thousands more WordPress Websites via RevSlider - New Malware Campaign

If SoakSoak wasn’t enough, we are starting to see a new malware campaign advantages the RevSlider vulnerability and compromising thousands of WordPress sites in the last few days.

Read More

QRadar 7.3.0

IBM QRadar Software is a simplified, flexible security intelligence platform with a robust, focused toolset. Through a single console, the QRadar Software platform integrates disparate functions, including SIEM, log management, configuration monitoring, network behaviour anomaly detection, risk management, vulnerability management, network vulnerability scanning, full packet capture, and network forensics into an extensive, streamlined solution.

Read More

Pages