Merry Christmas from all of us at KedronUK!

Merry Christmas from all of us at KedronUK!

As the holiday season fast approaches, we at KedronUK are thrilled to reflect on the incredible journey we’ve had throughout the year. It’s been a year of growth, new partnerships, and exciting milestones that have shaped our company’s narrative. Throughout this blog, we reminisce on the past year, and share some key highlights from our 2023.

Welcoming New Faces to the KedronUK Family
This year, our team has expanded with the addition of three talented individuals who have seamlessly become integral parts of our sales and technical teams. Join us in welcoming:

  • Max Raine – Business Development Assistant.
  • Sean Thompson – Systems Support Engineer.
  • Peter Costello – Account Executive.

Their expertise and enthusiasm have undoubtedly contributed to the success of our projects and the overall positive vibe within our work environment. We’re also looking forward to welcoming 3 new starters in the new year!

Forging Stronger Partnerships
In our commitment to delivering top-notch solutions, we are proud to announce new and exciting partnerships formed over the past year. Over the course of 2023, we have partnered with some valued vendors, such as, Forescout Technologies, Wib, Allegro Packets, Heimdal and BullWall. These collaborations with cutting-edge vendors have allowed us to enhance our service offerings and better address the evolving needs of our clients. 

Unforgettable Events Around the Globe
In 2023, we went beyond borders, hosting two company events in the heart of London and attending exciting partner events in Dubai and Germany. These experiences provided us with valuable insights, fostered new connections, and reinforced our commitment to being a global player in the IT industry. 

Celebrating 20 Years of Innovation
March marked a significant milestone for KedronUK as we celebrated our 20th anniversary. Two decades of innovation, dedication, and client satisfaction have shaped us into the company we are today. We extend our heartfelt gratitude to our clients, partners, and the incredible team that has been instrumental in our success. 

Looking Forward to the Future
As we bid farewell to 2023, we are excited about the possibilities that lie ahead. The coming year promises more innovation, continued growth, and the opportunity to strengthen existing relationships while forging new ones. We remain committed to delivering excellence in IT operations, security operations and service management. 

From all of us at KedronUK, we extend warm wishes for a joyful holiday season and a prosperous New Year. Thank you for being part of our journey, and we look forward to creating more success stories together in 2024. 

Merry Christmas!

Phil Swainson

Phil Swainson

Head of Technology

Responsible for the KedronUK portfolio, including in-house product development.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

November 2023 Industry Insights!

November 2023 Industry Insights!

Read some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Mastering IP Management, AI-Driven Cloud Anomaly Detection, Patch Management and much more!

KedronUK
“Bridging the Gap: Managing and Protecting OT/IoT in the IT World”. (Event)
Last month, we hosted our last #NoSalesPitch event of 2023 “Bridging the Gap: Managing and Protecting OT/IoT in the IT World” at Clays Bar in London and it’s safe to say it was another successful event! We had insightful presentations from some of our valued vendors, Forescout, Keysight Technologies, Infosim and Totuus, followed by some fun virtual clay pigeon shooting, and food and drink on us. From speaking to attendees, the key takeaway from the afternoon was that gaining visibility into and securing OT/IoT is difficult for a wide variety of reasons, but there are innovative solutions to help bridge the gap.
You can view our event presentations here!

ExtraHop
NDR Visibility Will Enable Zero Trust Transformation in 2024. (Blog Post)
As 2023 draws to a close, it’s a good time to consider how security leaders may need to shift their cyber strategies in the new year. One thing that’s certain: threat actors will continue trying their hardest to exploit any cyber weaknesses they can find, so ensuring your organisations cyber hygiene is in top form will remain critical. To the end, network visibility will be a crucial part of organisations transformational security plans in 2024. 
Read more here.

Infosim
Achieving Holistic Network Visibility with StableNet via 3rd-party Integration. (Blog Post)
A firms concrete understanding of what network visibility means depends on specific needs in accordance with your network scope, forcing many companies to use a mixture of tools. However, this can complicate data management and result in limited end-to-end visibility. The key to success for a deeper analysis is 3rd party integration into a single, unified platform solution. StableNet is a highly automated cross-vendor, -technology and -silo network and service management platform that combines configuration, fault and performance management as well as discovery and inventory on a single platform. In addition to a wide range of out-of-the-box network management functions, StableNet is able to seamlessly integrate 3rd party applications/technologies through open interfaces. Furthermore, StableNet offers you a high degree of flexibility and customisation through the integration of different data sources and intelligent data normalisation.
More information here.

Keysight Technologies
Mastering IP Management. (Blog Post)
In the intricate and high-pressure realm of integrated circuit (IC) design, IP reuse, whether it’s a basic component like matric multiplier and DSP to larger memory or wireless subsystem, is pivotal in accelerating design processes, minimising costs, and enabling the designers to focus on the differentiating components of the devices. To maximise the benefits of IP reuse, engineering teams may surprisingly find inspiration in the high-energy kitchens of restaurants. Both arenas share a common ground: the need for orchestration of a myriad of tools and resources, the relentless push against time constraints, and the quest to satisfy a clientele that demands nothing short of excellence.
Find out more about what to expect in 2024 here.

Rapid7
Rapid7 Introduces AI-Driven Cloud Anomaly Detection. (Blog Post)
Now available in early access for Rapid7 customers, Cloud Anomaly Detection helps security teams detect unknown threats in their cloud environments that traditional rule-based detections miss, and with more precision to avoid excess noise and false positives.

Detecting malicious activity in cloud environments poses a formidable challenge in cybersecurity due to the inherent speed and complexity of the cloud. Cloud infrastructure is dynamic, with constantly changing virtual assets, which make it hard to pinpoint and respond to threats effectively. The complexity of cloud configurations, the transient nature of assets, and the vast data generated can obscure malicious activities, necessitating advanced monitoring and analysis tools.
Find out more here.

Allegro Packets
Top 10 Use Cases. (Blog Post)
Is it the network, the server, the client, or the application? How can errors in the network be quickly detected and isolated – regardless of whether the event being analysed is current or in the past? What network performance statistics and metrics are displayed in what detail in the GUI? Here are Allegro Packets top 10 use cases to illustrate how and when Allegro Networks Multimeters can quickly identify network problems, performance bottlenecks, and packet loss.
Read the full article here!

Heimdal
Patch Management Guide. (Blog Post)
Patch management involved distributing and applying updates to various endpoints, which is crucial in fixing software vulnerabilities or unforeseen system interactions. 60% of cyber incidents leading to covert data theft link to absent, misconfigured, or incompletely implemented patches.

This article serves as an introduction to patch management, and will walk you through a patch management guide discussing modern and evolving practices, the importance of early patching in reducing vulnerabilities, frameworks for patch management, issues in deployment and post-deployment, and how implementing an early path policy can reduce costs linked to cyberattacks.
Read the full blog here.

Forescout
Hack the Building 2.0 Hospital – Training New Cybersecurity Talent. (Blog Post)
This year for the 13th year in a row, the healthcare idustry continues to experience the most expensive data breaches worldwide, at an average cost of nearly $11 million – double the cost for the next-highest industry, finance. That’s not surprising; ransomware attacks on hospitals and health systems are constantly in the news. Add to that the cybersecurity talent shortage, which is especially acute (pardon the pun) in the healthcase industry. Providing hands-on, specialised training for a new generation of skilled cybersecurity practitioners who understand the unique challenges of healthcare couldn’t be more timely.
Read the full blog post here.

Phil Swainson

Phil Swainson

Head of Technology

Responsible for the KedronUK portfolio, including in-house product development.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

October 2023 Industry Insights!

October 2023 Industry Insights!

Read some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Managing & Protecting IoT/OT in the IT World, Threat Briefing, 2023 Cyber Security Predictions and much more!

KedronUK
Upcoming Event – “Bridging the Gap: Managing and Protecting OT/IoT in the IT World”. (Event)
We’re hosting our latest #NoSalesPitch event “Bridging the Gap: Managing and Protecting OT/IoT in the IT World” at Clays Bar in London on Thursday 16th November. We will be showcasing some exciting technologies from our partners, but with no sales pitching! You will be free for some networking while being able to take advantage of a free bar, canapes, and the chance to join in on some virtual clay pigeon shooting.
Register here!

ExtraHop
Reveal(x) Threat Briefing Helps Users Find Cisco IOS XE Vulnerability (Blog Post)
ExtraHop has released a new Threat Briefing in Reveal(x) that gives users visibility into a critical vulnerability in the Cisco IOS XE networking software. This vulnerability allows attackers to gain top-level administrative access to targeted networks. The Threat Briefing shows users how to run queries for vulnerable Cisco IOS devices receiving external traffic.
Read more here.

Infosim
Unlocking Network Performances Insights with TWAMP and StableNet: A Comprehensive Guide. (Blog Post)
In the world of networking, measuring and optimizing network performance is a critical task. Network engineers and operators rely on various tools and protocols to ensure their networks are running efficiently and meeting performance targets. One such protocol that has gained prominence in recent years is TWAMP, which stands for Two-Way Active Measurement Protocol. This blog post will delve into the world of TWAMP, exploring its significance, functionality, and how it empowers network professionals to maintain and enhance network performance.
Find out more here.

Keysight Technologies
The Cyber Security Shakeup Continues in 2024. (Blog Post)
Cyber threats and cybercrime show no signs of slowing. The growing risk makes it imperative that organisations constantly evaluate their security posture and take steps to harden their defences, protect internal networks, and secure data from the barrage of threats.
Find out more about what to expect in 2024 here.

Rapid7
Is That Smart Home Technology Secure? Here’s How You Can Find Out. (Blog Post)
Smart technology should never be treated differently than how we as consumers look at other products, like purchasing an automobile for example. In the case of automobiles, we search for the vehicle that meets our visual and performance expectations, but that will also keep us and our family safe. With that said, shouldn’t we also seek smart home technologies that are secure and protect our privacy?
Find out more here.

Allegro Packets
IT-Administrator Tests The Allegro 1000. (Blog Post)
IT-Administrator, a specialist magazine published by Heinemann Verlag, carried out an independent device test with the Allegro Network Multimeter. The focus was on the Allegro 1000, which was thoroughly tested by a network professional. Besides the basic features of the Allegro, the article looks at external storage options, integration modes, the GUI or performance areas such as insights into VoiP.
Read the full article here!

Heimdal
12 Best Vulnerability Management Systems & Tools 2023. (Blog Post)
Industry reports highlight the urgency: malicious actors can exploit a vulnerability within just 15 days of its discovery (CISA). The longer you wait, the larger the target on your back grows. Without proper vulnerability management tools, your business not only risks data breaches but also the loss of customer trust, and revenue, and potentially faces legal ramifications. But with so many options to choose from, which solutions truly stand out in 2023?
Read the full blog here.

Forescout
DarkGate Loader Delivered via Microsoft Teams – How It Works, How To Mitigate It, and How Forescout Can Help. (Blog Post)
The threat intelligence data that Forescout Research – Vedere Labs curates comes from the millions of connected devices that we monitor, attacks we observe and dissect in our sandboxes, data relating to attacks that is traded on the Darknet, and from our Adversary Engagement Environment. We see a lot of data. One thing no cybersecurity researcher wants to see, however, is an attack on their own organization.

That’s exactly what happened on September 25, when Forescout was targeted in a highly tailored phishing attack abusing Microsoft Teams functionality to deliver the DarkGate Loader malware. Since many of us are cybersecurity professionals, and all employees receive regular training on how to spot phishing attempts, our Information Security team was able to quickly intervene.
Since then, Forescout has analysed the attack in detail. Discover out what they found here.

Phil Swainson

Phil Swainson

Head of Technology

Responsible for the KedronUK portfolio, including in-house product development.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

November 2023 Industry Insights!

September 2023 Industry Insights!

Read some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on the API Security Landscape, Network Audits, Active Risk, Zero Trust and much more!

KedronUK
Navigating the API security landscape: insights from the frontlines. (Blog Post)
As we step into this era of unprecedented connectivity and digital interaction, API’s have taken centre stage, becoming the backbone that powers the modern digital ecosystem. Strategic Account Manager at KedronUK, Kevin Toplass discusses in our latest blog post the growing concern he’s seen from a number of large enterprises on the critical need for API security.
Click here to read our latest blog.

ExtraHop
The role of Network Detection and Response in Zero Trust. (Blog Post)
Plans for zero trust implementation vary widely by sector. As employees continue to work from home, and others return to corporate offices with their own devices, it’s imperative for organisations to embrace zero trust security over traditional, perimeter-based security. This blog post discusses the role of network visibility and network detection and response (NDR) in zero trust.
Read more here.

Infosim
Network Audits made easy: Stay compliant and safe with StableNet. (Blog Post)
Network audit software can be instrumental to network operators of large, complex environments to ensure compliance and enhance security. A network and service management platform like StableNet® provides an ideal opportunity to consolidate a wide range of tasks, from discovery of your multi-vendor environment to automated root cause analysis. By combining all of this with end of life (EoL), vulnerabilities, and compliance and policy checking at regular intervals, you not only free up network operation resources but benefit from a holistic approach to network management with a single GUI that runs the entire gamut of tasks that you need.
Find out more here.

Keysight Technologies
Stay safe from the latest cyber threats! (Blog Post)
Constant changes happen in today’s digital world. New versions of applications, databases, middleware, and virtualisation technologies are being released regularly – at least once every 6-12 months. Patches and upgrades to operating systems and changes to anti-virus software are being released in weekly cycles rather than months. As DevOps gets adopted on a broader scale, changes to applications will be even more frequent. With agile methodologies being implemented, code rollouts can even happen every few days in production.
Click here to read more.

Wib
Building an API-first security program – the why and how. (Whitepaper)
In today’s digital landscape, organizations increasingly rely on microservice architectures to enable faster development and deployment of their applications. APIs (application programming interfaces) play a crucial role in these architectures, enabling communication and data exchange between various services. As a result, APIs have become an attractive target for attackers who seek to exploit vulnerabilities and gain unauthorized access to valuable company resources.
Read more of Wibs whitepaper here.

Rapid7
Introducing Active Risk. (Blog Post)
Cyber risk is increasing both in volume and velocity. Given the landscape of threats, weaknesses, vulnerabilities, and misconfigurations, organisations, teams, and vulnerability analysts alike need better prioritisation mechanisms. That’s why Rapid7 have developed a new risk scoring methodology: Active Risk.
Read more about Active Risk here.

Allegro Packets
Release 4.1 Allegro Packets. (Blog Post)
Allegro Packets is now providing network professionals with enhanced functionality with it’s new Release 4.1. The new release has new features and enhancements to offer customers extended capabilities to analyse their network data.
Find out more about Release 4.1 here!

Heimdal
12 benefits of Zero Trust for mid-sized businesses. (Blog Post)
Zero Trust security is evolving from “nice to have” to an absolute must for organisations everywhere. Fortunately, Zero Trust offers numerous advantages to companies of all sizes, including medium-sized ones. While achieving full implementation of Zero Trust for mid-sized businesses is a long-term goal, even adopting partial Zero Trust environments can help organisations of this size enhance their security posture and benefit in several other areas.
Click here to read more.

Forescout
Detect the most common Ransomware TTPs to prevent attacks. (Blog Post)
The recent high-profile cyberattack on MGM Resorts International, still under investigation, put ransomware back in the public spotlight. News reports and social media posts cited widespread issues with deactivated digital room keys locking guests out of their rooms; slot machines, ATMs and elevators taken offline; and websites taken down. The takeaway here is you must be ever vigilant in the face of less notorious ransomware attacks that occur every day. This blog provides information on how to detect the most common ransomware TTPs – so you can prevent attacks!
Read more here.

Phil Swainson

Phil Swainson

Head of Technology

Responsible for the KedronUK portfolio, including in-house product development.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL