Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

How Your Trade Secret Can Be Leaked

A new precedent is being seen across borders worldwide – handing over your smart phone to airport security. When a US born NASA scientist Sidd Bikkannavar was pressured into giving his NASA owned smart phone and PIN code across to Border Patrol agents - who consequently vanished for thirty minutes with both pieces of information – until he was free to leave.

Read More

Filtering Data within Splunk

Typically within a business an instance of Splunk would be indexing varied forms of data at copious volumes. A few examples would be Windows registry, event logs, application web logs, Linux configuration syslog, application web logs, and database audits.

Read More

IBM Security App Exchange - Digital Guardian App for QRadar

Data Loss Prevention (DLP) and Advanced Threat Protection (ATP) are two of the most cutting edge technologies that are currently available in the cyber security market. One of the industry leading vendors in this space is Digital Guardian, who provide technologies to combat both ATPs and DLP, however introduction of additional solutions can provide a headache to Security teams as it gives them another interface to monitor during a security incident.

Read More

Modifying Carbon Black Response Users Without Access To The GUI

In this blog I will show you how to do a change password, unlock a user and add a user to carbon black response without access to the GUI. Please note this works for all versions of response.

Read More

DRIDEX Avoiding Detection In The Finance Industry

If you don’t know already, DRIDEX is an online banking malware that steals personal information through HTML injections. It's main target are customers of financial/banking institutions based in Europe. Identified around November 2014, DRIDEX is considered to be the direct successor of online banking malware CRIDEX. With its new techniques and routines it avoids detection.

Read More

Transforming Vulnerability Management: Introducing Tenable.io

The vulnerability management industry is at a crossroads: solve long-standing problems and equip security teams for the future, or become obsolete.

Read More

EU GDPR & Digital Guardian

A series of blogs regarding the impending EU GDPR regulation, what is it, who it will affect the most, why was the original laws amended, when will this legislation be enforced, and how can companies work efficiently to become compliant with tools like Digital Guardian.

Read More

QRadar SIEM: Customising The Right-Click Menu

By default the right click plug-in menu in QRadar includes X-Force Exchange Lookup, you can expand the menu option for IP address lookups by customising the ip_context_menu.xml file.

Read More

SecurityCenter Assurance Report Cards - Better Metrics for Faster Results

With the release of SecurityCenter 5.0 almost two years ago, Tenable introduced a new metric based analysis method for your vulnerability, compliance and event data – Assurance Report Cards, or ARCs. I am often asked by existing customers how ARCs can be used effectively to help track and remediate vulnerabilities or other security concerns effectively.

Read More

Tenable Delivers LCE 5.0.0

Tenable is pleased to announce a major update to the Log Correlation Engine® (LCE®), making it easier to scale horizontally to meet growing organizational demands on performance and redundancy. Additionally, LCE 5.0.0 greatly expands language support for log data. This release will be available on January 30th, 2017.

Read More

Pages