The official blog from Satisnet Ltd

Effective password management: The debate continues

TripwireIt is generally accepted that increased password complexity results in better security. But researchers at Microsoft and the University of Ottawa have now published a paper (PDF) on the topic that concludes somewhat the opposite.

Read this post →

How Splunk helped drive online revenue growth at John Lewis

SplunkSplunk Enterprise is a fully featured, powerful platform that collects and indexes any machine data from virtually any source in real time. Many customers download Splunk to solve a specific issue, but quickly find themselves using it to do much more than they originally intended.

Read this post →

The 6 types of DDoS protection for your business

RadwareDDoS attacks are increasing in frequency, not least because they often don’t require a high level of technical skill to implement.  Anyone can simply purchase the use of any number of nodes on one or more botnets for an hourly fee and use a GUI to launch an attack.

Read this post →

How Zombie Zero targets an organisation’s ERP systems

OnapsisThe Zombie Zero malware has been used to target at least half a dozen large European and US Companies by simply scanning business critical data, financial records and other ERP information away.

Read this post →

Apple and IBM forge global partnership to transform enterprise mobility

IBMIBM and Apple have announced an exclusive partnership that teams the market-leading strengths of each company to transform enterprise mobility through a new class of business apps which will bring IBM’s big data and analytics capabilities to Apple’s iOS devices.

Read this post →

GameOver Zeus reanimates and launches further attacks

Malcovery’s analysts have identified a new trojan based heavily on the GameOver Zeus binary, which has begun distribution as an attachment in spam email messages. Once opened, the malware attempts to contact certain websites in accordance with a domain generation algorithm, the goal of which is to make contact with a server that can in turn provide instructions to the malware.

Read this post →

Data loss may be costing you more than you think

DruvaLost, stolen or damaged devices cause frustration and downtime as a result of data loss, but will also cost your company money. Identifying all the areas of impact that data loss has on your company can enables you to make the business case for a solution to address these issues.

Read this post →

When intranets and SharePoint aren’t mobile-ready, users turn to email

AccellionDespite heavy investment by enterprises in intranets and SharePoint, in many organisations these services are not ready to support mobile users, forcing them to fall back on on email for file sharing and transfer.

Read this post →

AccelOps positioned on the 2014 Gartner SIEM Magic Quadrant

AccelopsAccelOps was included on the Gartner Magic Quadrant for Security Information and Event Management (SIEM) for the first time this year. The report noted how detection of threats and breaches in addition to compliance are important drivers for enterprises SIEM projects and purchases.

Read this post →

Windows XP retirement: Java support has also now ended

SophosFurther to the recent retirement of Windows XP, Sophos has issued a reminder that Oracle will not be issuing an update to Java on XP on the 15th July when it releases its regular update.

Read this post →

Survey finds BYOD devices cluttered with apps as mobile malware increases 167%

AccellionMobile phones and tablets come with a collection of default apps, including email, web browser, calendar and maps. Many enterprises provide their employees with additional apps, such as VPN, security and bespoke apps for unique business functions. Most users will also install numerous additional apps of their own choice, and in some cases these can number more than 100.

Read this post →

Aerohive positioned in the Gartner Visionaries Quadrant for 2014

AerohiveAerohive has announced that they have been positioned by Gartner, Inc. in the “Visionaries” quadrant of the 2014 Magic Quadrant for Wired and Wireless LAN Access Infrastructure. Vendors were evaluated based on their ability to execute and completeness of vision.

Read this post →

Use Thycotic Secret Server to protect your company’s social media

ThycoticA seemingly innocent HTML experiment by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He exploited an open vulnerability in TweetDeck, Twitter’s social media management platform. Over 10.1 million of BBC News’s followers received a self-retweeting hack. BBC News and CNN weren’t the only ones affected: nearly 1,000 Twitter accounts were hijacked.

Read this post →

Five burning security issues in cloud computing

RadwareWidespread adoption of cloud computing and the storage of data in a multitude of locations has created an increasing requirement for security and reliability. Enterprises must now widen their security strategy to include the monitoring and protection of cloud-based data.

Read this post →

Endpoint backup is now even more essential

Employees are increasingly reliant upon using their personal and company issued mobile devices to perform their jobs. Access to corporate data is required regardless of the time, place or device, and enterprises are having to implement solutions that securely protect corporate data without compromising productivity. Seamless backup and restore capabilities are now required across a multitude of different devices and operating systems.

Read this post →

Growing number of DDoS cyber extortion attacks on tech companies

The New York Times reports on a large increase in instances of DDoS attacks on technology start-ups by cybercriminals who aim to extort money from them by threatening to shut down their systems until a ransom is paid.

Read this post →

Accelerate the Cloud: Integrate Puppet Enterprise with VMware vCloud Automation Center

Puppet LabsCloud computing and agile development are accelerating how quickly applications are deployed into the cloud. That means application teams are assuming more responsibility for how and where apps are deployed in the cloud.

Read this post →

Lumension launches Endpoint Management and Security Suite with Mobile Device Management v8.0

LumensionThere’s no shortage of Mobile Management Device (MDM) solutions to choose from, and Lumension has just entered the market with an MDM solution that is integrated into their already successful Lumension Endpoint Management and Security Suite (L.E.M.S.S.) platform.

Read this post →

Skyhigh Networks report: Only 7% of cloud services are ‘enterprise ready’

skyhigh-logo-120-croppedA new report from SkyHigh Networks, the company that enables IT, Security and Compliance teams to discover, analyse and secure cloud services, has found that the use of cloud services within enterprises has grown by 33% since last quarter. However, only 7% of these services are considered “enterprise-ready.”

Read this post →

EU data security law: Understanding the new compliance reality

vormetric-logoLast Thursday and in partnership with FieldFisher, Vormetric released a press release and White Paper outlining the latest legal obligations for encryption of personal data in the United States, Europe, Asia and Australia.

Read this post →