Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Is Prevention Better Than Remediation?

Absolutely. I want to open discussion around Zero Day attacks. More specifically - how to best prepare for one.

Read More

The Problem's with Current Learning Management Systems

In this article, I'd like to look at how we're currently issuing training to end users. More specifically - I'd like to look at some of the common problems I regularly hear CISO's/CDIO's/CIO's talk about when it comes to training end users. Whether the topic of training is threat awareness or new company policies - there are still many flaws between the content that gets created in order to teach and that content reaching the end user.

Read More

The Importance of End User Awareness

With GDPR less than a year away, are we all preparing as best we can? GDPR shouldn't be mentioned with the tone of it only affecting members of board, CIO's/CTO's/controllers and processors. When we talk about GDPR - we should be looking at both ends of the spectrum. End users play a huge part in the general data protection regulation cycle.

Read More

UACMe – Bypass Windows User Account Control (UAC)

These days bypassing user security controls is one of the desired steps for hackers. UACme is a compiled, C-based tool which contains a number of methods to defeat Windows User Account Control mostly known as UAC. It misuses the built-in Windows AutoElevate backdoor and contains 41 techniques.

Read More

How offering conversion training to ex-military personnel can help close the notable skills gap in cybersecurity

Research by Frost and Sullivan confirms there is a significant gap of available qualified cybersecurity professionals and states there will be 1.8 million unfilled cybersecurity positions by 2022. (1)

Read More

Password Rules

Ok so not the most riveting blog in the world but keeping up to date with anything IT security related is a must even if it does mean reading a page full of bullet points! Although it can be used as a reference when raining staff or even yourself.

Read More

Methodology To Implementing Patch Management

We are constantly seeing that the time period between a vulnerability is discovered in application or OS and appearance of an exploit is getting shorter, in some instances it has taken only a few hours before a vulnerability is exploited. IT managers are being put under pressure to promptly patch their production systems which conflicts with best practices of quality assurance testing.

Read More

QRadar Technical Blog: To Flow Or Not To Flow

QRadar began life as a network product, converted to an event log management tool and is now returning to its roots with QRadar Network Insights (QNI).

Read More

Types of Cyber Attacks To Look Out For

This blog is going to be short and sweet, but informative for anyone that is new to the cyber field or needs a recap.

Read More

SecurityCenter – Speedier Remediating

A Verizon Data Breach Report release always brings with it a wealth of information regarding industry trends towards the discovery of vulnerabilities and how fast organisations are able to act once they have been discovered; and this year is no different.

Read More

Pages