Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on our latest Webinar discussing Smarter Network Management, the 5 Most Common Operational Technology Security Issues, Shaping Sustainable and Resilient Communication Networks, and much more.
KedronUK
Smarter Network Management – Migrating from Legacy NMS to StableNet®. (Webinar)
Is your current network management platform holding you back? Join KedronUK on Tuesday 14th October at 11am for a 45-minute live webinar, where we’ll show you how organisations are making the move to StableNet® – a mature, fully-integrated platform that delivers automation, visibility, and long-term transparency.
Register here.
Forescout Technologies
5 Most Common Operational Technology Security Issues. (Blog Post)
Operational technology (OT) systems control and monitor industrial processes in sectors, including energy, manufacturing, water treatment, transportation, and more. As these systems become increasingly interconnected with information technology (IT) networks, their exposure to cyber threats grows. Protecting OT environments requires a keen understanding of their unique vulnerabilities and challenges.
Find out more here.
Infosim
Shaping Sustainable and Resilient Communication Networks. (Blog Post)
The reliability of communication is not only essential for everyday interpersonal interaction, but also for critical infrastructure such as energy supply, healthcare, and public safety. The importance of robust, fail-safe communication networks becomes particularly apparent in times of crisis such as natural disasters, cyberattacks, terrorist attacks, and similar events. These networks are essential for coordinating rescue teams and relief efforts, maintaining basic supply functions, and ensuring a reliable information flow. At the same time, the sustainability of these networks is becoming increasingly important due to rising energy requirements. The key here is to minimise energy consumption while maintaining reliable, high-quality communication.
Read the full blog post here.
SenseOn
Identity is the New Perimeter. (Whitepaper)
Over 80% of breaches now involve compromised credentials, not malware. Attackers don’t need to break in. They log in. Phishing MFA fatigue, and token theft are driving a wave of identity-based threats that most traditional tools weren’t built to catch. Security teams are expected to detect misuse, investigate sign-ins, and respond to identity incidents. But identity data is fragmented across Entra ID, Okta, Google Workspace and others. Most investigations require jumping between tools, hunting for context, and reacting late.
Download the Whitepaper here.
Rapid7
New Infographic Showcases How Rapid7 MDR Stops Threats Fast. (Blog Post)
In cybersecurity, the first few minutes of an attack can define the rest of the story. Will it be a minor event swiftly contained with no data loss, or the beginning of a full-blown incident that leads to costly remediation, reputational damage, and lasting business disruption?
The difference often comes down to how fast and how well your organisation can detect, understand, and respond to the threat.
Read more & view the infographic here.
BullWall
The Cyber Assessment Framework. (Blog Post)
The UK’s new Cyber Assessment Framework (CAF) 4.0 has raised the bar for cyber resilience. It asks executives of essential service providers to demonstrate not only that they understand today’s attacker behaviours, but they can detect, stop, and recover from them before critical operations are disrupted.
There’s one attacker behaviour that consistently tops the threat landscape and regulator concerns: ransomware-drive mass encryption. And this is exactly where BullWall adds unique, measurable value to your security stack.
Find out more here.
ExtraHop
Unmasking Threats Across the Network with Real-time Identity Insights. (Blog Post)
In today’s complex digital landscape, where hybrid networks, remote work, and SaaS growth are the norm, understanding “who” is behind network activity is paramount. Identity is no longer solely an IT concern: it’s the cornerstone of modern security.
Identity is the new battleground, and attackers are having a field day. With so many user accounts, devices, and services in the cloud, there are endless opportunities for compromise. A user (customers, employees, partners, and vendors) can be a weak point for attackers to get in and move around, stealing data or spreading ransomware.
Find out more here.
Allegro Packets
Allegro Network Multimeter Release 4.5. (Blog Post)
The new firmware version 4.5 is available for the Allegro Network Multimeter. This firmware contains numerous improvements and enhancements compared to version 4.4.3 and can be installed on all devices with support.
Read about the highlights of the release here.
DBmarlin
DBmarlin 5.8.0 is now available! (Blog Post)
DBmarlin are excited to share thier latest updates, including a brand-new DB Versions screen, improvements to DBmarlin Co-Pilot, and a number of performance and upgrade enhancements.
View all the new and improved features here.

Kirsty Jones
Marketing and Brand Development Lead
Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

