May 2025 Industry Insights!

May 2025 Industry Insights!

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on our lastest Partnership with SenseOn, Cybersecurity in Manufacturing, GenAI in Network Management, and much more.

KedronUK
New Partnership with SenseOn! (Press Release)
KedronUK is proud to announce our new partnership with SenseOn, a leader in AI-driven cybersecurity.

As a result of this agreement, we can now offer customers a unified cybersecurity platform that integrates data from existing tools combined with native visibility, delivering actionable intelligence to strengthen their defense and reduce security team’s workload.

Read more about the partnership here.

BullWall
Ransomware in Manufacturing. (Blog Post)
The manufacturing industry is consistently under attack from cyber criminals. Cybercriminals are launching relentless ransomware attacks to shut down factories, stop production lines, and hold the critical infrastructure they gained access to as hostage.

Manufacturing businesses and the interconnected supply chain are particularly vulnerable to ransomware attacks due to several factors:

  • Industrial Control Systems (ICS): Many manufacturing facilities rely on outdated ICS systems. Due to outdated ICS, there are many potential entry points for cybercriminals.
  • Interconnected Supply Chains: Modern manufacturing relies on complex, interconnected supply chains, creating more entry points and increasing the value of the ransom demanded.
  • High-Value Assets: Manufacturing facilities often house valuable equipment and often house something that can be even more valuable: intellectual property.
  • Production Halt: Ransomware attacks shut down production lines, leading to a high cost of downtime while also impacting the supply chain.

Find out more here.

Forescout Technologies
Cybersecurity in Manufacturing: Threats, Trends, and Preparation. (Blog Post)
The manufacturing sector has consistently ranked among the most heavily impacted by ransomware groups, and other threats, such as data breaches. The sector includes a wide range of industries – from automotive and electronics to chemicals and heavy machinery.

In Forescout’s 2024 Threat Roundup, manufacturing ranked fourth among the most targeted critical infrastructure sectors in 2024 – while the number of threat actors increase by 71%. Given this major increase, Forescout has decided to look closer.

Read more the full blog here.

Infosim
GenAI in Network Management. (Blog Post)
Since ChatGPT was introduced at the end of 2022, generative AI (genAI) has gained significant attention. Every day, developers are creating novel and powerful applications and use cases that showcase the potential capabilities of genAI. The technology behind ChatGPT, known as Large Language Models (LLMs), has received significant attention. With the increased availability of information and computing power, numerous new models have emerged. The application possibilities of genAI and LLMs have steadily expanded in recent years. So, it’s no wonder the demand for AI-driven network management with genAI is also growing. Let’s discuss how genAI and LLM can be beneficial to network management and operations.

Find out more here.

Keysight Technologies
Understanding ReNeLLM (Blog Post)
In the rapidly evolving field of AI and LLM security, where researchers and adversaries are constantly pushing boundaries to come up with new attack vectors, a new jailbreak technique known as ReNeLLM is gaining attention. This method employs a multi-layer strategy to fool LLMs by carefully crafting prompts that evade safety mechanisms. In this blog, Keysight discusses how this attack works under the hood by breaking down its two-stage attack methodology and its support in BreakingPoint.

Read more here.

Rapid7
Seeing is Securing: How Surface Command Expands MDR Visibility and Impact. (Blog Post)
Shadow IT, orphaned assets and internet-facing exposures, and unmanaged cloud services are all part of an expanding attack surface. And, according to Enterprise Strategy Group, 76% of organisations have experienced some type of cyberattack involving an unknown or unmanaged internet-facing asset – the kind of risk that stems from gaps in visibility. The result? A critical mismatch between the Attack Surface (what adversaries can reach), and the Detection Surface (what MDR services are configured to see and respond to).

To maximise the effectiveness of security operations, MDR must continually evolve. Read the full blog here.

Logpoint
The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools. (Blog Post)
In today’s evolving threat landscape, we continually see new threat actors emerge and novel attack techniques surface. To keep pace, defenders must monitor the tactics, techniques and procedures (TTPs) leveraged by these threat actors. A critical part of this understanding comes from analysing the tools attackers use to achieve their objectives.

Find out more here.

Heimdal
Cybersecurity in an Age of Geopolitical Uncertainty: The European Advantage. (Blog Post)
In today’s tumultuous world, trust is just as critical as technology. Geopolitical tensions in 2025 are blurring the lines between allies and adversaries, forcing organisations to rethink whom they trust with their cybersecurity.

The blog post explores how geopolitical uncertainty impacts cybersecurity, the unique value European providers offer, and how Heimdal Security remains a trusted and committed partner for European businesses.

Read more here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

Enhancing OT / IoT Visibility with Keysight & Forescout

Enhancing OT / IoT Visibility with Keysight & Forescout

Catch up on our latest webinar, in partnership with Keysight Technologies & Forescout Technologies, where we explore how organisations can achieve comprehensive OT/IoT Visibility and enhance security through cutting-edge solutions.

What was discussed? 

1. Chris Booth, Solution Architect at KedronUK sets the scene for OT / IoT security challenges. 

2. Luc Alptuna Director EMEA & APAC Business Development at Keysight Technologies discusses how Keysight can enhance Forescouts capabilities by providing actionable insights and network visibility to secure your infrastructure. 

3. Hassan El Karhani, Field Technology Officer at Forescout Technologies touches on how they can deliver real-time asset visibility and enfore Zero Trust principles in Operational Technology (OT) and Internet of Things (IoT) environments.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

April 2025 Industry Insights

April 2025 Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Enhancing OT/IoT Visibility, Network Visibility and Deep Packet Inspection, Health Industry Cybersecurity Practices, and much more.

KedronUK
Enhancing OT/IoT Visibility with Keysight & Forescout (Webinar)
Join KedronUK, Forescout, and Keysight on Wednesday 21st May at 2pm for an exclusive webinar where we will explore how organisations can achieve a comprehensive OT/IoT visibility and enhance security through cutting-edge solutions.

Register for the webinar here!

BullWall
Health Industry Cybersecurity Practices. (Blog Post)
The health industry continues to evolve rapidly, meaning the digital imprint of the healthcare industry grows daily. Although access to electronic health records (EHRs), telemedicine, and connected medical devices are revolutionising patient care, more patient information is stored in systems that cybercriminals are trying to access illegally.

Many in the health industry are unaware that every connected system is a potential entry point for cybercriminals, making BullWall Ransomware Containment a necessary solution. Even fewer understand the many ways a ransomware attack impacts healthcare organisations.

Find out more here.

Forescout
Rethinking Enterprise Security in IT and OT Systems. (Blog Post)
Every enterprise thinks they know what’s on their network. Until they don’t. When they don’t, security teams are paralysed, compliance efforts stall, and attacks slip through unnoticed.

The root of the issue? A false of visibility in increasingly complex, interconnected environments. Smart factories. Smart medical devices. Self-driving cars. Todays world is becoming more and more intertwined with cyber-physical systems.

Modern IT and OT systems and networks are under siege from a growing flood of alerts, fragmented tools, and unmanaged, specialised devices. Visibility is patchy, alerts are noisy, and security teams are stretched thin.

Read more a here and find out how Forescout uncover and understand everything on your network.

Logpoint
Logpoint’s release: Reduce operational burden and gain efficiency. (Blog Post)
According to the European Union Agency for Cybersecurity’s (ENISA) 2024 report, the industry-wide talent gap continues to challenge security teams, leading to inefficiencies and increased workloads. Recognising these challenges, Logpoint’s latest release is designed to reduce operational burdens, enhance efficiency, and improve security outcomes. With a strong focus on automation, centralised monitoring and centralised management, this release helps SOC teams and MSSPs streamline their workflows, scale their operations and maximise their security investments.

Find out more here.

Rapid7
Why is Ransomware Still a Thing in 2025? (Blog Post)
We all know ransomware is one of the most persistent and damaging threats out there. Yet, this isn’t because it’s new – ransomwares been around since 1989 – but because we are making it far too easy for threat actors.

Ransomware remains a crisis because we are still giving attackers the upper hand. To regain control, we need to understand how we’ve made it so easy for them, and what we can do to change that.

Read more here.

Keysight Technologies
Network Visibility and Deep Packet Inspection (DPI) Deliver Better Threat Detection Together. (Blog Post)
Most modern cybersecurity strategies feature deep packet inspection (DPI) capabilities that help to find and flag potential cyber threats faster. After a quick update on DPI, we’ll see how network visibility makes DPI more powerful and efficient and how you can leverage these capabilities together to keep data safe in the cloud and in the age of AI.

Find out more here.

ExtraHop
A Modern Approach to Network Detection & Response. (Blog Post)
The current cybersecurity environment is characterised by relentless barrage of sophisticated threats, demanding equally sophisticated defences. However, cyberattacks over the last several years have proven time and time again that traditional defences alone cannot defend the modern enterprise.

With security leaders increasingly recognising the dire need to detect and respond to lateral movement throughout their hybrid networks. NDR has reached a crucial stage of maturity: evolve from a promising concept to an adaptable, integrated solution that aligns with the realities of the modern enterprise.

Read more about the Modern NDR approach here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

May 2025 Industry Insights!

February 2025 Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Security Thoughts for 2025, Zero Trust Principles, AI- Powered Visibility, and much more.

KedronUK
Security Thoughts for 2025 (Blog Post)
Beyond AI, cybersecurity challenges continue to evolve. Effective vulnerability management requires more than just CVSS scores, and supply chain attacks highlight the need for greater scrutiny of third-party providers. Meanwhile, advancements in quantum computing could reshape encryption and cloud security.

As we navigate 2025, understanding these trends will be key to staying ahead in an increasingly complex digital landscape.

Please see the full blog here!

BullWall
Why Hospital Cybersecurity is More Than Protecting Patient Data. (Blog Post)
Today, hospitals are more than just medical facilities to be referred to for surgery or emergency healthcare needs; they’re complex ecosystems of interconnected services house value patient data.

Though modern medicine and the systems and servers used to store data have allowed quicker and safer patient care, they are also frequent targets of cybercriminals. Since the healthcare industry, especially hospital networks and medical facilities, is a frequent target of cyber-attacks, it is important to have a ransomware resilience tool prior to an attack.

If BullWall Ransomware Containment is in place when a cybercriminal attack happens, the spread will be halted, compromised devices will be instantly isolated, and encryption will be prevented. Find out more here.

Forescout
Zero Trust Principles: Address Asset Visualisation and Classification. (Blog Post)
Forescout has developed a step-by-step approach to realising Zero Trust security. They call it “The Adaptive Approach to Zero Trust Assurance,” and it’s designed to help meet zero trust mandates faster with a simplified transition roadmap. 2024 saw a rise in cyber threats and regulatory pressures. Personal liability for CISOs increased along with the number of audit requirements needed to prove compliance and quantify organisational exposure and risks.
To defend against these threats, organisations that want to be proactive must assume a breach mindset: Acknowledge the inevitability of a breach with active defences that minimize its impact.

It starts by addressing the most critical assets in the business with the principles of Zero Trust. Read more about Zero Trust here.

Infosim
KRITIS, DORA, NIS1 – Knowledge for Network Management. (Blog Post)
In an era of increasing cybersecurity risks and regulatory pressure, network operators must navigate a complex landscape of compliance frameworks. Three key regulations—KRITIS, DORA, and NIS 2—are shaping the future of network management and reporting requirements. While each framework serves a distinct purpose, they share common goals in strengthening resilience, cybersecurity, and operational stability across critical infrastructure. Understanding their differences and similarities is essential for network operators to ensure compliance and optimize their security strategies.

Find out more here.

Rapid7
MDR + SIEM: Why Full Access to Your Security Logs Is Non-Negotiable. (Blog Post)
Many Managed Detection and Response (MDR) providers promise world-class threat detection, but behind the scenes they lock away your security logs, limiting your visibility and control. It’s your data — so why don’t you have full access to it? Isn’t the whole point of security to see everything happening in your environment? Without full access to your own data, you’re left dependent on their tools, their timelines, and their interpretations of security events.

This isn’t just an inconvenience — it’s a risk.

Find out more about pairing MDR with SIEM here.

Keysight Technologies
The Sooner the Better: AI-Powered Visibility Accelerates Threat Detection and IT Operations. (Blog Post)
We expect Artificial intelligence (AI) to speed up processes and drive down costs, and that seems to be what’s happening in cybersecurity. A recent survey found that 1 in 5 organizations now use AI in their cybersecurity practices, and their investments paid high dividends on multiple fronts – like faster threat detection, lower breach costs, and reduced strain on overworked SOC teams.

After a quick update on the role and value of AI, Keysight introduce a new generation of AI-powered network visibility and explain why applying AI earlier in the process helps to find threats faster and give defenders an even greater advantage.

Read more here.

ExtraHop
Malicious Use of RMM: Remote Monitoring and Management. (Blog Post)
Network detection and response (NDR) refers to cybersecurity products that ingest and analyse network traffic to detect malicious activity. Where endpoint detection and response (EDR) tools collect and analyse endpoint data and behavior, network detection and response solutions work off wire data from network packets traversing the east-west and north-south corridors.

According to Gartner®, “Network detection and response (NDR) products detect abnormal system behaviors by applying behavioral analytics to network traffic data. They continuously analyse raw network packets or traffic metadata within internal networks (east-west) and between internal and external networks (north-south).

Find out more about NDR here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

January 2025 Industry Insights

January 2025 Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on OT/IoT Visibility, Medical Ransomware, 2025 Cybersecurity Predictions, and much more.

KedronUK
OT/IoT Visibility Survey Report (Blog Post)
Although the integration of IT with OT, ICS, and IoT/IoMT networks allow for streamlines process, predictive maintenance, and enhanced data analysis capabilities, it also introduces significant challenges, particularly in the realm of cybersecurity.

In response to these challenges, we conducted a survey in partnership with Keysight Technologies and Forescout Technologies, to better understand how enterprises are approaching the integration of these diverse systems.

Please see the full report and summary of responses here!

BullWall
How BullWall Strengthens Resilience Against Medical Ransomware. (Blog Post)
The healthcare industry has become a prime target for ransomware attacks, with cybercriminals increasingly focusing on hospitals, clinics, and medical device manufacturers. Medical ransomware attacks compromise critical healthcare systems, disrupt patient care, and pose significant risks to sensitive patient data. For healthcare organisations, where every second counts, and downtime caused by ransomware can have devastating consequences – delayed treatments, financial losses, and even threats to patient safety.

Find out more about medical ransomware attacks here.

Forescout
7 Cybersecurity Predictions for 2025. (Blog Post)
As we quickly approach a new year, the threat landscape is evolving. Here, we share the most pressing cybersecurity predictions across critical infrastructure, operational technology (OT), ransomware, artificial intelligence, the supply chain, and more.

In 2025, the cybersecurity landscape will be defined by sophisticated, multi-layered threats from AI assisted hacking to persistent ransomware and targeted OT attacks. As threat actors evolve their tactics, organisations must stay proactive and use the latest technologies and strategies to protect their critical infrastructure and assets.

Read more here.

Infosim
How to Identify Better Ways to Manage Your Managed Service. (Blog Post)
Managed Service Providers (MSPs) play a crucial role in keeping IT operations running smoothly for their customers. From managing IT security to overseeing entire infrastructures, MSPs take on the heavy lifting so businesses can focus on what they do best.

But having the right tools in place is non-negotiable. Transparent, efficient, and seamless operations depend on them. The problem? The tech landscape is constantly evolving, and customer demands are only getting bigger. This makes building the perfect tech stack a real challenge. For MSPs, it’s all about staying ahead of the curve and proving they’ve got everything covered, no matter how complex the environment gets.

Read the full blog post here.

Rapid7
Unlocking the Power of AI in Cybersecurity. (Blog Post)
Todays SOC teams have to face dramatic challenges that include overwhelming volumes of alerts, blurred perimeter protections, and resource constraints; meanwhile, AI is bursting into SOC workflows as one of the most important elements in addressing these issues more productively and letting teams truly focus on what matters most.

See details from Rapid7’s recent webinar here.

Keysight Technologies
Keysight Launches All-in-One Solution for Network Visibility and Security. (Blog Post)
Keysight Technologies launched AppFusion, a network visibility partner program that integrates third-party security and monitoring solutions directly into its network packet brokers. The program integrates market-leading technologies from Forescout, Instrumentix, and Nozomi Networks enabling customers to streamline network and security operations (NetOps/SecOps) while significantly reducing infrastructure costs. This all-in-one, multi-vendor solution helps IT professionals reduce capital and operations expenses while improving security monitoring and performance.

Find out more here.

Logpoint
EDR Killers: After All, EDRs Are Not Invincible. (Blog Post)
Endpoint Detection and Response (EDR) tools are our frontline warriors in the ever-evolving cybersecurity battlefield. Yet, a new menace is taking shape: EDR killers – tools designed to impair these defences, leaving organisations exposed to devastating attacks.

Read more here.

ExtraHop
Malicious Use of RMM: Remote Monitoring and Management. (Blog Post)
For IT and security teams, remote monitoring and management (RMM) software, such as AnyDesk, ConnectWise, ScreenConnect, and Splashtop are a lot like cordless electric chainsaws. On one hand, they make tedious tasks like remote pitch installation and troubleshooting far faster and easier. But on the other hand, because they allow remote users such as helpdesk admins to take control of an end users computer, threat actors are increasingly exploiting legitimate RMM software to establish an interactive command and control (C2) channel, move laterally across an organisations network, maintain persistence, and fly under the radar of traditional detection by blending in with legitimate operations.

Find out more here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL