November 2023 Industry Insights!

November 2023 Industry Insights!

Read some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Mastering IP Management, AI-Driven Cloud Anomaly Detection, Patch Management and much more!

KedronUK
“Bridging the Gap: Managing and Protecting OT/IoT in the IT World”. (Event)
Last month, we hosted our last #NoSalesPitch event of 2023 “Bridging the Gap: Managing and Protecting OT/IoT in the IT World” at Clays Bar in London and it’s safe to say it was another successful event! We had insightful presentations from some of our valued vendors, Forescout, Keysight Technologies, Infosim and Totuus, followed by some fun virtual clay pigeon shooting, and food and drink on us. From speaking to attendees, the key takeaway from the afternoon was that gaining visibility into and securing OT/IoT is difficult for a wide variety of reasons, but there are innovative solutions to help bridge the gap.
You can view our event presentations here!

ExtraHop
NDR Visibility Will Enable Zero Trust Transformation in 2024. (Blog Post)
As 2023 draws to a close, it’s a good time to consider how security leaders may need to shift their cyber strategies in the new year. One thing that’s certain: threat actors will continue trying their hardest to exploit any cyber weaknesses they can find, so ensuring your organisations cyber hygiene is in top form will remain critical. To the end, network visibility will be a crucial part of organisations transformational security plans in 2024. 
Read more here.

Infosim
Achieving Holistic Network Visibility with StableNet via 3rd-party Integration. (Blog Post)
A firms concrete understanding of what network visibility means depends on specific needs in accordance with your network scope, forcing many companies to use a mixture of tools. However, this can complicate data management and result in limited end-to-end visibility. The key to success for a deeper analysis is 3rd party integration into a single, unified platform solution. StableNet is a highly automated cross-vendor, -technology and -silo network and service management platform that combines configuration, fault and performance management as well as discovery and inventory on a single platform. In addition to a wide range of out-of-the-box network management functions, StableNet is able to seamlessly integrate 3rd party applications/technologies through open interfaces. Furthermore, StableNet offers you a high degree of flexibility and customisation through the integration of different data sources and intelligent data normalisation.
More information here.

Keysight Technologies
Mastering IP Management. (Blog Post)
In the intricate and high-pressure realm of integrated circuit (IC) design, IP reuse, whether it’s a basic component like matric multiplier and DSP to larger memory or wireless subsystem, is pivotal in accelerating design processes, minimising costs, and enabling the designers to focus on the differentiating components of the devices. To maximise the benefits of IP reuse, engineering teams may surprisingly find inspiration in the high-energy kitchens of restaurants. Both arenas share a common ground: the need for orchestration of a myriad of tools and resources, the relentless push against time constraints, and the quest to satisfy a clientele that demands nothing short of excellence.
Find out more about what to expect in 2024 here.

Rapid7
Rapid7 Introduces AI-Driven Cloud Anomaly Detection. (Blog Post)
Now available in early access for Rapid7 customers, Cloud Anomaly Detection helps security teams detect unknown threats in their cloud environments that traditional rule-based detections miss, and with more precision to avoid excess noise and false positives.

Detecting malicious activity in cloud environments poses a formidable challenge in cybersecurity due to the inherent speed and complexity of the cloud. Cloud infrastructure is dynamic, with constantly changing virtual assets, which make it hard to pinpoint and respond to threats effectively. The complexity of cloud configurations, the transient nature of assets, and the vast data generated can obscure malicious activities, necessitating advanced monitoring and analysis tools.
Find out more here.

Allegro Packets
Top 10 Use Cases. (Blog Post)
Is it the network, the server, the client, or the application? How can errors in the network be quickly detected and isolated – regardless of whether the event being analysed is current or in the past? What network performance statistics and metrics are displayed in what detail in the GUI? Here are Allegro Packets top 10 use cases to illustrate how and when Allegro Networks Multimeters can quickly identify network problems, performance bottlenecks, and packet loss.
Read the full article here!

Heimdal
Patch Management Guide. (Blog Post)
Patch management involved distributing and applying updates to various endpoints, which is crucial in fixing software vulnerabilities or unforeseen system interactions. 60% of cyber incidents leading to covert data theft link to absent, misconfigured, or incompletely implemented patches.

This article serves as an introduction to patch management, and will walk you through a patch management guide discussing modern and evolving practices, the importance of early patching in reducing vulnerabilities, frameworks for patch management, issues in deployment and post-deployment, and how implementing an early path policy can reduce costs linked to cyberattacks.
Read the full blog here.

Forescout
Hack the Building 2.0 Hospital – Training New Cybersecurity Talent. (Blog Post)
This year for the 13th year in a row, the healthcare idustry continues to experience the most expensive data breaches worldwide, at an average cost of nearly $11 million – double the cost for the next-highest industry, finance. That’s not surprising; ransomware attacks on hospitals and health systems are constantly in the news. Add to that the cybersecurity talent shortage, which is especially acute (pardon the pun) in the healthcase industry. Providing hands-on, specialised training for a new generation of skilled cybersecurity practitioners who understand the unique challenges of healthcare couldn’t be more timely.
Read the full blog post here.

Kirsty Jones

Kirsty Jones

Marketing Executive

Spreads the word further and wider about how we can help connect and visualise your IT ops and sec ops data

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

October 2023 Industry Insights!

October 2023 Industry Insights!

Read some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Managing & Protecting IoT/OT in the IT World, Threat Briefing, 2023 Cyber Security Predictions and much more!

KedronUK
Upcoming Event – “Bridging the Gap: Managing and Protecting OT/IoT in the IT World”. (Event)
We’re hosting our latest #NoSalesPitch event “Bridging the Gap: Managing and Protecting OT/IoT in the IT World” at Clays Bar in London on Thursday 16th November. We will be showcasing some exciting technologies from our partners, but with no sales pitching! You will be free for some networking while being able to take advantage of a free bar, canapes, and the chance to join in on some virtual clay pigeon shooting.
Register here!

ExtraHop
Reveal(x) Threat Briefing Helps Users Find Cisco IOS XE Vulnerability (Blog Post)
ExtraHop has released a new Threat Briefing in Reveal(x) that gives users visibility into a critical vulnerability in the Cisco IOS XE networking software. This vulnerability allows attackers to gain top-level administrative access to targeted networks. The Threat Briefing shows users how to run queries for vulnerable Cisco IOS devices receiving external traffic.
Read more here.

Infosim
Unlocking Network Performances Insights with TWAMP and StableNet: A Comprehensive Guide. (Blog Post)
In the world of networking, measuring and optimizing network performance is a critical task. Network engineers and operators rely on various tools and protocols to ensure their networks are running efficiently and meeting performance targets. One such protocol that has gained prominence in recent years is TWAMP, which stands for Two-Way Active Measurement Protocol. This blog post will delve into the world of TWAMP, exploring its significance, functionality, and how it empowers network professionals to maintain and enhance network performance.
Find out more here.

Keysight Technologies
The Cyber Security Shakeup Continues in 2024. (Blog Post)
Cyber threats and cybercrime show no signs of slowing. The growing risk makes it imperative that organisations constantly evaluate their security posture and take steps to harden their defences, protect internal networks, and secure data from the barrage of threats.
Find out more about what to expect in 2024 here.

Rapid7
Is That Smart Home Technology Secure? Here’s How You Can Find Out. (Blog Post)
Smart technology should never be treated differently than how we as consumers look at other products, like purchasing an automobile for example. In the case of automobiles, we search for the vehicle that meets our visual and performance expectations, but that will also keep us and our family safe. With that said, shouldn’t we also seek smart home technologies that are secure and protect our privacy?
Find out more here.

Allegro Packets
IT-Administrator Tests The Allegro 1000. (Blog Post)
IT-Administrator, a specialist magazine published by Heinemann Verlag, carried out an independent device test with the Allegro Network Multimeter. The focus was on the Allegro 1000, which was thoroughly tested by a network professional. Besides the basic features of the Allegro, the article looks at external storage options, integration modes, the GUI or performance areas such as insights into VoiP.
Read the full article here!

Heimdal
12 Best Vulnerability Management Systems & Tools 2023. (Blog Post)
Industry reports highlight the urgency: malicious actors can exploit a vulnerability within just 15 days of its discovery (CISA). The longer you wait, the larger the target on your back grows. Without proper vulnerability management tools, your business not only risks data breaches but also the loss of customer trust, and revenue, and potentially faces legal ramifications. But with so many options to choose from, which solutions truly stand out in 2023?
Read the full blog here.

Forescout
DarkGate Loader Delivered via Microsoft Teams – How It Works, How To Mitigate It, and How Forescout Can Help. (Blog Post)
The threat intelligence data that Forescout Research – Vedere Labs curates comes from the millions of connected devices that we monitor, attacks we observe and dissect in our sandboxes, data relating to attacks that is traded on the Darknet, and from our Adversary Engagement Environment. We see a lot of data. One thing no cybersecurity researcher wants to see, however, is an attack on their own organization.

That’s exactly what happened on September 25, when Forescout was targeted in a highly tailored phishing attack abusing Microsoft Teams functionality to deliver the DarkGate Loader malware. Since many of us are cybersecurity professionals, and all employees receive regular training on how to spot phishing attempts, our Information Security team was able to quickly intervene.
Since then, Forescout has analysed the attack in detail. Discover out what they found here.

Kirsty Jones

Kirsty Jones

Marketing Executive

Spreads the word further and wider about how we can help connect and visualise your IT ops and sec ops data

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

Breach & Attack Simulation: UK Market Report

Breach & Attack Simulation: UK Market Report

In today’s digital age, businesses must be proactive in protecting their sensitive data and networks from cyber threats. One way to do this is through the use of breach and attack simulation (BAS) tools. BAS tools are designed to test the resilience of a company’s cybersecurity policies and procedures by simulating real-world cyber-attacks. This allows businesses to identify vulnerabilities and weaknesses in their systems before a malicious actor can exploit them. However, many business leaders may be unsure of the differences between breach and attack simulation, vulnerability scanning, and penetration testing.

Vulnerability scanning is the process of identifying and assessing vulnerabilities in a company’s systems and networks. This is typically done using automated tools that scan for known vulnerabilities and provide a report on any that are found. Penetration testing, on the other hand, goes one step further by actively attempting to exploit vulnerabilities in a company’s systems and networks. This is done by a team of ethical hackers who simulate real-world attacks to identify and assess the effectiveness of a company’s cybersecurity defences.

BAS takes a different approach by simulating real-world cyber-attacks in a controlled environment. This allows businesses to test their cybersecurity policies and procedures in a realistic scenario and identify any gaps or weaknesses. One of the challenges when deploying BAS is knowing how to deploy it within different customers’ unique technical architectures, to test all the critical security policies. Kedron provides this expertise as part of their service along with ongoing support and review. This means customers get the benefit of a delivered managed service but without the higher costs of a total outsource arrangement.

Kedron offers the ThreatSim product from Keysight, a market leading BAS solution, as part of their service. Many experts in the field, such as Gartner and Forrester, have stated that Breach and Attack Simulation is essential for enterprise security teams. Gartner states that “BAS solutions are essential for enterprise security teams to test the effectiveness of their security controls and identify vulnerabilities that need to be prioritized for remediation.” Forrester notes that “BAS has emerged to provide an attackers view, with deeper insights into vulnerabilities, attack paths, and weak/failed controls, making it an essential tool for any enterprise security team looking to proactively identify and remediate vulnerabilities before they can be exploited by attackers.”

In conclusion, breach and attack simulation is an important tool that should be used in addition to vulnerability scanning and penetration testing. It allows businesses to test their cybersecurity policies and procedures in a realistic scenario and identify vulnerabilities before they can be exploited.

Read our recent Survey Report in partnership with Keysight Technologies, to learn more about how KedronUK and ThreatSim can help you business with BAS services.

Kirsty Jones

Kirsty Jones

Marketing Executive

Spreads the word further and wider about how we can help connect and visualise your IT ops and sec ops data

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

New Partnership with Allegro Packets!

New Partnership with Allegro Packets!

Who are Allegro Packets and when was the company established?

Allegro Packets was formed by Klaus Denger, a serial tech entrepreneur, in 2007. Based out of Leipzig Germany his mission was to provide affordable, fast and easy to use insights into Network issues. This led to a range of 4th generation Network Performance management solutions.

How did Allegro Packets and Kedron come together?

Kedron was identified as a Partner who could add to Allegro’s channel only focus, as previous experience of working together of management made a good fit. Kedron’s customer first ethos fitted perfectly with Allegros, who’s continued development of the solution is based on customer feedback. 90% of all development is done this way with regular user feedback days.

What gap is Kedron filling for Allegro Packets?

Kedron as a partner brings real benefit as a true Value-added reseller. Years of experience in the Network performance management field has lead to a wealth of expertise that could see the benefit of the Allegro range. From small portable solutions to large Enterprise installations Kedron has the staff and project management skills to ensure a successful deployment.

What can Allegro Packets bring to Kedron?

When the initial solution was created. The first pillar was performance. 3rd Generation systems captured all the packets, then extracted for analysis. This had two problems. The first is time to extract those packets, mining through all the captured packets, takes time. The second is capturing and storing all those packets require huge drive arrays. 4th generation Allegros overcome this by real time analysis that allows users to instant go to the issues. Packets of interest can then be stored. This leads to the second pillar affordability. Less storage = lower cost. Allegro’s bring performance management back to sensible budgets levels with superb ROI. The third pillar, ease of use, is from a simple intuitive L2-7 menu system with a top down view means issues can be found quickly and easily. Add the software is the same on a large data centre as it is for portables an easy hybrid monitoring and ad-hoc environment can be created, without learning two sets of software.

Phil Swainson, Head of Technology at KedronUK says: “We’ve found that customers managing enterprise networks are struggling to find a network performance management tool focused on packets that can handle the demands of high-speed, high-bandwidth networks, while not breaking the bank with excessive storage requirements. The unique way Allegro Packets solutions work means that network managers and IT Ops managers can get the information they need without having to search petabytes of data.”

To find out more about Allegro Packets, please Contact us or get in contact with our sales team through sales@kedronuk.com

Kirsty Jones

Kirsty Jones

Marketing Executive

Spreads the word further and wider about how we can help connect and visualise your IT ops and sec ops data

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

November 2023 Industry Insights!

September 2023 Industry Insights!

Read some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on the API Security Landscape, Network Audits, Active Risk, Zero Trust and much more!

KedronUK
Navigating the API security landscape: insights from the frontlines. (Blog Post)
As we step into this era of unprecedented connectivity and digital interaction, API’s have taken centre stage, becoming the backbone that powers the modern digital ecosystem. Strategic Account Manager at KedronUK, Kevin Toplass discusses in our latest blog post the growing concern he’s seen from a number of large enterprises on the critical need for API security.
Click here to read our latest blog.

ExtraHop
The role of Network Detection and Response in Zero Trust. (Blog Post)
Plans for zero trust implementation vary widely by sector. As employees continue to work from home, and others return to corporate offices with their own devices, it’s imperative for organisations to embrace zero trust security over traditional, perimeter-based security. This blog post discusses the role of network visibility and network detection and response (NDR) in zero trust.
Read more here.

Infosim
Network Audits made easy: Stay compliant and safe with StableNet. (Blog Post)
Network audit software can be instrumental to network operators of large, complex environments to ensure compliance and enhance security. A network and service management platform like StableNet® provides an ideal opportunity to consolidate a wide range of tasks, from discovery of your multi-vendor environment to automated root cause analysis. By combining all of this with end of life (EoL), vulnerabilities, and compliance and policy checking at regular intervals, you not only free up network operation resources but benefit from a holistic approach to network management with a single GUI that runs the entire gamut of tasks that you need.
Find out more here.

Keysight Technologies
Stay safe from the latest cyber threats! (Blog Post)
Constant changes happen in today’s digital world. New versions of applications, databases, middleware, and virtualisation technologies are being released regularly – at least once every 6-12 months. Patches and upgrades to operating systems and changes to anti-virus software are being released in weekly cycles rather than months. As DevOps gets adopted on a broader scale, changes to applications will be even more frequent. With agile methodologies being implemented, code rollouts can even happen every few days in production.
Click here to read more.

Wib
Building an API-first security program – the why and how. (Whitepaper)
In today’s digital landscape, organizations increasingly rely on microservice architectures to enable faster development and deployment of their applications. APIs (application programming interfaces) play a crucial role in these architectures, enabling communication and data exchange between various services. As a result, APIs have become an attractive target for attackers who seek to exploit vulnerabilities and gain unauthorized access to valuable company resources.
Read more of Wibs whitepaper here.

Rapid7
Introducing Active Risk. (Blog Post)
Cyber risk is increasing both in volume and velocity. Given the landscape of threats, weaknesses, vulnerabilities, and misconfigurations, organisations, teams, and vulnerability analysts alike need better prioritisation mechanisms. That’s why Rapid7 have developed a new risk scoring methodology: Active Risk.
Read more about Active Risk here.

Allegro Packets
Release 4.1 Allegro Packets. (Blog Post)
Allegro Packets is now providing network professionals with enhanced functionality with it’s new Release 4.1. The new release has new features and enhancements to offer customers extended capabilities to analyse their network data.
Find out more about Release 4.1 here!

Heimdal
12 benefits of Zero Trust for mid-sized businesses. (Blog Post)
Zero Trust security is evolving from “nice to have” to an absolute must for organisations everywhere. Fortunately, Zero Trust offers numerous advantages to companies of all sizes, including medium-sized ones. While achieving full implementation of Zero Trust for mid-sized businesses is a long-term goal, even adopting partial Zero Trust environments can help organisations of this size enhance their security posture and benefit in several other areas.
Click here to read more.

Forescout
Detect the most common Ransomware TTPs to prevent attacks. (Blog Post)
The recent high-profile cyberattack on MGM Resorts International, still under investigation, put ransomware back in the public spotlight. News reports and social media posts cited widespread issues with deactivated digital room keys locking guests out of their rooms; slot machines, ATMs and elevators taken offline; and websites taken down. The takeaway here is you must be ever vigilant in the face of less notorious ransomware attacks that occur every day. This blog provides information on how to detect the most common ransomware TTPs – so you can prevent attacks!
Read more here.

Kirsty Jones

Kirsty Jones

Marketing Executive

Spreads the word further and wider about how we can help connect and visualise your IT ops and sec ops data

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL

Navigating the API Security Landscape: Insights from the Frontlines

Navigating the API Security Landscape: Insights from the Frontlines

Recently, I’ve been deeply entrenched discussing the complex and evolving landscape of API security with my enterprise and service providers customers. 

As we step into this era of unprecedented connectivity and digital interaction, API’s have taken the centre stage, becoming the backbone that powers the modern digital ecosystem. However, the spotlight is now shining on the critical need for API security, a concern that is shared by numerous large enterprises I’ve had the privilege of working with through KedronUK. 

In this article I wanted to share an overview of why this topic is so important: 

API’s: The Glue that Holds our Digital World Together

API’S (Application Programming Interfaces) play a pivotal role in bringing diverse applications together enabling them to communicate, share data, and seamlessly perform tasks. With the increasing reliance on API’s for essential interactions between people, businesses, and applications, ensuring their security has become paramount. 

The Rising Concern of API Security

Recently there have been a notable rise in cyber-attacks via API’s. This alarming trend has prompted business leaders to re-evaluate their priorities. It’s quite unbelievable to note that while over 90% of executives understand the mission-critical nature of API’s, many have not place API security at the forefront of their concerns. 

In discussions with various contributors, it’s clear that API security problems are not just theoretical worries – a staggering 94% of those I’ve engaged with have directly experienced these issues. the impact goes beyond anecdotes: more than half of the companies have been forced to delay the release of new API’s due to security concerns. Despite these pressing challenges, a mere 11% have a dedicated API security plan in place, encompassing specialised API testing protective measures. 

Empowering Businesses with KedronUK and Wib Fusion Discovery

As a consultant who has collaborated on several substantial projects to address these concerns, I feel KedronUK are able to provide a market-leading solution that resonates deeply with the enterprises I’ve worked with. KedronUK, in conjunction with the innovative Wib Fusion Discover software, provides a comprehensive answer to the growing API security dilemma. 

The essence of Fusion Discovery lies in it’s ability to grant enterprises unprecedented visibility across the entire API lifecycle. This advanced approach drastically reduces blind spots, cuts down on false positives, and bolsters an organisations resilience against potential API security vulnerabilities. 

Real-world Impact: Unveiling the Power of Fusion Discovery

A recent experience with a major international media company showcased the remarkable potential of Fusion Discovery. This company, much like others, grappled with a lack of insight into their sprawling API ecosystem. Through Fusion Discovery’s capabilities, we swiftly generated a comprehensive inventory of their API estate – spanning both on-premises and cloud deployments – within two hours. What’s more, the ongoing documentation ensured not only the present API integrity but also a guarantee of future-proof assurance. 

Conclusion: Safeguarding Tomorrow’s Digital Landscape

As we reflect on the intricate web of API’s that underpin our digital interactions, one truth becomes abundantly clear: the future is API-centric. 

Yet, this future demands a holistic approach that addresses the growing concerns of security.

As a consultant, working closely with KedronUK and the cutting-edge Fusion Discover solution, I’ve witnessed a transformation in how enterprises perceive and tackle API security challenges. 

The numbers don’t lie – the overwhelming instances of API security problems and the postponement of crucial API releases underscore the gravity of the situation. However, this is not a tale of despair; it’s a story of proactive adaptation and empowerment. 

With Fusion Discovery’s steadfast ability to illuminate the entire API landscape, we’re standing at the precipice of a new era in cybersecurity. This is an era where enterprises can take charge of their digital destiny, fortify their systems against potential vulnerabilities, and enable innovation without compromise. 

So, as we move forward into this API-driven world, let’s remember that every interaction, every data exchange, and every application we rely on is supported by API’s. The responsibility to secure this foundation lies with us, and the tools at our disposal, like Fusion Discovery, are paving the way for a secure and prosperous digital future. Let’s embrace this journey together, armed with knowledge, innovation, and unwavering commitment to a safer tomorrow. 

For more information on how KedronUK and Wib can help your business with API service, feel free to contact us at sales@kedronuk.com or call us on 01782 752369

Kirsty Jones

Kirsty Jones

Marketing Executive

Spreads the word further and wider about how we can help connect and visualise your IT ops and sec ops data

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL