October 2025 Industry Insights

October 2025 Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on our latest Webinar discussing Smarter Network Management, Emerging Cybersecurity Threats and Challenges, Unifying the SOC and the NOC, and much more.

KedronUK

Smarter Network Management – Migrating from Legacy NMS to StableNet®. (Webinar recording)
Is your current network management platform holding you back? Catch up on our latest webinar and discover how StableNet® unifies network & service management with automation, cost transparency, and proven migration support.

Download here.

Keysight Technologies

What the EU Cyber Resilience Act Means for Digital Product Makers. (Blog Post)
The EU Cyber Resilience Act (CRA) is set to become a defining regulation for all manufacturers and developers of digital products that touch the EU market. It introduces strict requirements for cybersecurity practices, risk management, and compliance procedures, affecting a wide range of stakeholders from software developers to hardware vendors. This article unpacks what the CRA is, who it affects, and how to get ready.

Find out more here.

Infosim

NCCM Vulnerability and End-of-Life with StableNet®. (Whitepaper)
StableNet‘s automated network and service management solution offers a highly effective approach to simplifying Network Configuration and Change Management (NCCM) by providing robust, automated inventory and discovery capabilities. The platform solution ensures that network visibility is comprehensive and current through customizable, regularly scheduled discovery jobs that automatically identify and document hardware details, interconnections, and dynamic Parameters like routing protocols and neighbourhood views. Beyond discovery, StableNet®‘s NCCM solution integrates automated backup and restore, policy compliance checks, and change Management processes into a cohesive, streamlined framework.

Download the whitepaper here.

SenseOn

6 Best Insider Threat Detection Tools. (Blog Post)
Sometimes the most dangerous security threats come from inside the firewall. A small minority of employees and other trusted individuals will compromise their organisations, whether by accident or design. Motivations for insider threats include:

  • Political or ideological reasons.
  • Profit and financial gain
  • Revenge after an incident or lack of recognition
  • Sabotaging other individuals within a workspace
  • Attempting to advance their careers
  • Negligence (for example, clicking on a phishing email).

Today, insider threats are common and can be devastating. Many organisations notice an insider threat has occurred long after the fact, such as in the event of intellectual property theft or when sensitive information is leaked online.

Read more here.

Rapid7

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond. (Blog Post)
The global threat landscape is undergoing an unprecedented transformation. Organisations are facing dizzying levels of complexity, driven by rapid technological innovation, the widespread adoption of artificial intelligence, and the expected disruptive effects of quantum computing. At the same time, shifting geopolitical dynamics, the rise of sophisticated cybercriminal networks, and the introduction of new regulatory frameworks are fundamentally reshaping how the private and public sectors must approach security.

Against this backdrop, this blog post examines the cyber threats expected to emerge within the next 3 to 5 years. It explores the challenges posed by these constantly evolving risks, analysing the technical aspects of cyber threats as well as the strategic, regulatory, and human factors that define the modern security landscape. Most importantly, it provides actionable insights that organisations can utilise to strengthen their cyber resilience.

Read the full blog post here.

BullWall

2026 Ransomware Resilience Benchmark Report. (Report)
Based on input from hundreds of security leaders, our 2026 Ransomware Resilience Benchmark Report is designed to help executives, security leaders, and boards understand:

  • How your organisations ransomware defences compare to peers
  • Where critical resilience gaps still exist
  • How requently organisations are being hit by ransomware
  • How the impact extends far beyond IT to operations, revenue, and reputations
  • The practical steps required to move from misplaced confidence to proven ransomware resilience

Download the report here.

ExtraHop

Unifying the SOC and the NOC for Stronger Cyber Resilience. (Blog Post)
Traditionally, Security Operations Centres (SOCs) and Network Operations Centres (NOCs) have operated as distinct entities, each with a specialised focus. SOCs are focused on protecting the organisation from cybersecurity threats, while NOCs are responsible for ensuring the continuous availability and performance of the organisation’s IT infrastructure.

Both the NOC and SOC exist to support the business. Their shared mission is to minimise disruptions and ensure that the organisation can continue its operations effectively and securely. Downtime, whether due to a network outage or a cyberattack, directly impacts productivity, revenue, and reputation. Without strong collaboration and unified tools, these intertwined issues can lead to delayed responses, increased damage, and a fundamentally incomplete understanding of the risk landscape.

Find out more here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Smarter Network Monitoring

Smarter Network Monitoring

Is your current network management platform holding you back? With rising subscription costs, limited automation, and complex renewal terms, many IT leaders are now re-evaluating their legacy NMS tools.

Catch up on our webinar where we discuss how organisations are making the move to StableNet® — a mature, fully-integrated platform that delivers automation, visibility, and long-term cost transparency.

Why catch up?

  • See what a modern, automated NMS can do.
  • Understand the migration path step-by-step.
  • Take advantage of Kedron’s exclusive Year 1 price-match offer and guaranteed savings beyond.

August 2025 Industry Insights

August 2025 Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on our latest Webinar discussing Smarter Network Management, the 5 Most Common Operational Technology Security Issues, Shaping Sustainable and Resilient Communication Networks, and much more.

KedronUK

Smarter Network Management – Migrating from Legacy NMS to StableNet®. (Webinar)
Is your current network management platform holding you back? Join KedronUK on Tuesday 14th October at 11am for a 45-minute live webinar, where we’ll show you how organisations are making the move to StableNet® – a mature, fully-integrated platform that delivers automation, visibility, and long-term transparency.

Register here.

Forescout Technologies

5 Most Common Operational Technology Security Issues. (Blog Post)
Operational technology (OT) systems control and monitor industrial processes in sectors, including energy, manufacturing, water treatment, transportation, and more. As these systems become increasingly interconnected with information technology (IT) networks, their exposure to cyber threats grows. Protecting OT environments requires a keen understanding of their unique vulnerabilities and challenges.

Find out more here.

Infosim

Shaping Sustainable and Resilient Communication Networks. (Blog Post)
The reliability of communication is not only essential for everyday interpersonal interaction, but also for critical infrastructure such as energy supply, healthcare, and public safety. The importance of robust, fail-safe communication networks becomes particularly apparent in times of crisis such as natural disasters, cyberattacks, terrorist attacks, and similar events. These networks are essential for coordinating rescue teams and relief efforts, maintaining basic supply functions, and ensuring a reliable information flow. At the same time, the sustainability of these networks is becoming increasingly important due to rising energy requirements. The key here is to minimise energy consumption while maintaining reliable, high-quality communication.

Read the full blog post here.

SenseOn

Identity is the New Perimeter. (Whitepaper)
Over 80% of breaches now involve compromised credentials, not malware. Attackers don’t need to break in. They log in. Phishing MFA fatigue, and token theft are driving a wave of identity-based threats that most traditional tools weren’t built to catch. Security teams are expected to detect misuse, investigate sign-ins, and respond to identity incidents. But identity data is fragmented across Entra ID, Okta, Google Workspace and others. Most investigations require jumping between tools, hunting for context, and reacting late.

Download the Whitepaper here.

Rapid7

New Infographic Showcases How Rapid7 MDR Stops Threats Fast. (Blog Post)
In cybersecurity, the first few minutes of an attack can define the rest of the story. Will it be a minor event swiftly contained with no data loss, or the beginning of a full-blown incident that leads to costly remediation, reputational damage, and lasting business disruption?

The difference often comes down to how fast and how well your organisation can detect, understand, and respond to the threat.

Read more & view the infographic here.

BullWall

The Cyber Assessment Framework. (Blog Post)
The UK’s new Cyber Assessment Framework (CAF) 4.0 has raised the bar for cyber resilience. It asks executives of essential service providers to demonstrate not only that they understand today’s attacker behaviours, but they can detect, stop, and recover from them before critical operations are disrupted.

There’s one attacker behaviour that consistently tops the threat landscape and regulator concerns: ransomware-drive mass encryption. And this is exactly where BullWall adds unique, measurable value to your security stack.

Find out more here.

ExtraHop

Unmasking Threats Across the Network with Real-time Identity Insights. (Blog Post)
In today’s complex digital landscape, where hybrid networks, remote work, and SaaS growth are the norm, understanding “who” is behind network activity is paramount. Identity is no longer solely an IT concern: it’s the cornerstone of modern security.

Identity is the new battleground, and attackers are having a field day. With so many user accounts, devices, and services in the cloud, there are endless opportunities for compromise. A user (customers, employees, partners, and vendors) can be a weak point for attackers to get in and move around, stealing data or spreading ransomware.

Find out more here.

Allegro Packets

Allegro Network Multimeter Release 4.5. (Blog Post)
The new firmware version 4.5 is available for the Allegro Network Multimeter. This firmware contains numerous improvements and enhancements compared to version 4.4.3 and can be installed on all devices with support.

Read about the highlights of the release here.

DBmarlin

DBmarlin 5.8.0 is now available! (Blog Post)
DBmarlin are excited to share thier latest updates, including a brand-new DB Versions screen, improvements to DBmarlin Co-Pilot, and a number of performance and upgrade enhancements.

View all the new and improved features here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

SenseOn Survey Report

SenseOn Survey Report

In Collaboration with SenseOn, an AI-driven cybersecurity platform, we conducted this survey to better understand how organisations are navigating current security challenges. The goal was to capture real, practical insights into: 

  • The most pressing cybersecurity pain points today.
  • The impact of tool sprawl and data cost models (e.g. in traditional SIEM solutions).
  • How organisations are using, evaluating, or planning for AI and automation in their security stack. 
  • Evolving attitudes toward vendor geography and trust, particularly in light of recent geopolitical shifts. 

The insights gathered aim to inform not only our understanding of the market, but also support organisations in benchmarking their current strategies and identifying areas for improvement, simplification, or innovation. 

October 2025 Industry Insights

July Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Navigating Cybersecurity Challenges, Improving Operational Resilience, Insights into the 2025 Ransomware Economy, and much more.

KedronUK

Navigating Cybersecurity Tool Choices in the Age of AI. (Report)
In collaboration with SenseOn, an AI-driven cybersecurity platform, we conducted a survey to better understand how organisations are navigating cybersecurity challenges.

We wanted to hear directly from security practitioners and decision-makers to learn what’s working, what’s not, and where they see the greatest opportunities and risks in today’s cybersecurity environment.

Read the full survey report here.

Forescout Technologies

Improve Operational Resilience with Harm Reduction. (Blog Post)
Data can drive smart decisions. It tells a truth. You can pay attention to what it’s saying and reprioritise. Or it can be recognised and put aside. But putting it aside in business doesn’t mean ignoring it. It means finding a defensible risk model. One that works for you, your board, your shareholders, your customers, and employees.

You always need to understand your operational resilience – and you need to get agreement on acceptable and unacceptable security, cyber-physical, and OT security tolerances.

Find out more here.

Infosim

Developments in the Fiber Optic and Telecommunications Industry in Germany. (Blog Post)
Increasing global connectivity through new technologies such as the Internet of Things (IoT) and 5G is generating growing demand for high-speed internet access and more reliable wireless networks. The expansion of the fiber optic infrastructure is of central importance for Germany’s digital transformation. The current expansion rate at the end of 2024 is 48.8%. The government, network operators and industry associations such as the German Broadband Association (BREKO) are actively committed to achieving a nationwide fiber coverage as fast as possible.

Read the full blog post here, where Infosim examine the dynamic changes in the telecommunications industry in Germany, analyses the resulting challenges for network service providers (NSPs) and outlines key solutions.

Keysight Technologies

What the EU Cyber Resilience Act means for Digital Product Makers. (Blog Post)
The EU Cyber Resilience Act (CRA) is set to become a defining regulation for all manufacturers and developers of digital products that touch the EU market. It introduces strict requirements for cybersecurity practices, risk management, and compliance procedures, affecting a wide range of stakeholders from software developers to hardware vendors. This article unpacks what the CRA is, who it affects, and how to get ready.

Find out more here.

Rapid7

Inside the Ransomware Economy in 2025. (Blog Post)
Building on insights from Rapid7’s Q1 and Q2 2025 ransomware trend reports, it’s clear that the ransomware economy continues to evolve – and not just in volume, but also in business maturity. As threat actors shift tactics, tools, and partnerships, defenders face a complex landscape shaped by affiliate churn, rising ransom demands, and increasingly sophisticated social engineering campaigns.

This blog explores the latest ransomware trends 2025, threat intelligence, and practical takeaways to help security teams stay ahead of the threat.

Read more here.

BullWall

Securing VMware Environments in an Era of Escalating Cyber Threats. (Blog Post)
Ransomware has evolved into one of the most disruptive threats in cybersecurity, and virtualised environments have become an increasingly frequent target. Organisations running VMware vSphere and ESXi platforms are now prime targets, facing not just financial losses but the potential collapse of critical business operations. With cybercriminals continuously innovating their attack strategies, security leaders must rethink their defences and adopt a proactive, automated approach to safeguarding their virtual infrastructures.

Find out more here.

ExtraHop

From Potential to Performance: Maximising AI’s Impact with Modern NDR. (Blog Post)
Artificial intelligence (AI) and machine learning have become foundational components for effective network detection and response (NDR), fundamentally reshaping how organisations defend against modern threats.

According to the 2024 Global Cyber Confidence Index, 38% of security decision-makers said using AI and machine learning to help manage and mitigate cyber risk is a top priority for their organization this year.

Despite this clear priority, enterprises are only just beginning to really understand the transformational benefits that intelligent NDR solutions can offer.

Find out more here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.