Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on ensuring a PCI DSS compatible solution, the latest Cyber Security threats, how Network Visibility unlocks Zero Trust,  and much more.

KedronUK
Ensuring a PCI DSS Compatible Solution with Rapid7 InsightIDR. (Case Study)
With card payments now accounting for the majority of customer transactions, helping to ensure conformity with the Payment Card Industry Data Security Standard (PCI DSS) was a prerequisite for J.W. Lees. Having worked with KedronUK previously, J.W. Lees approached the team seeking an enhanced solution to maximise security and assist with compliance towards PCI DSS. KedronUK strongly felt that – with the customer use case in mind – Rapid7 InsightIDR offered a more feature-rich solution compared to other vendors. InsightIDR has contributed significantly to enable J.W. Lees work towards achieving enhanced compliance in relation to the PCI DSS.
Read the full case study here!

ExtraHop
How Network Visibility Unlocks Zero Trust. (Blog Post)
One of the fundamental principles of cybersecurity is that you can’t protect what you can’t see. For the modern government agency, that means knowing at any given time who and what is on your network, how data is flowing across it, and the health of your endpoints. This isn’t a static picture: endpoints, data flows, and users are dynamic. If you protect your network AND get the highest level of performance from it, you need to understand how all these different factors work together and shift over time.
Read more here.

Infosim
StableNet® BI: Transforming Data into Power. (Blog Post)
StableNet®’s all new Business Intelligence (SNBI) offers a revolutionary solution by seamlessly integrating diverse data sources, granting businesses unprecedented insights. By combining infrastructure management with BI tools, companies gain the capability to optimize business processes and anticipate market shifts, enhancing their competitive edge. This integration not only streamlines operations but also fortifies the organization’s resilience by enabling proactive, holistic decision-making to prevent costly downtime and invest intelligently for future growth.
Click here for more information.

Keysight Technologies
Latest Cybersecurity Threats. (Blog Post)
Have you started 2024 feeling well prepared for the latest cyberthreats? In this month’s cyber threats rollup, Keysight have observed some major new attacks. The Keysight Application and Threat Intelligence (ATI) Research Centre has been keeping customers and partners safe by creating simulations of the latest cybersecurity attacks and incorporating them into Threat Simulator, Keysight’s breach and attack simulation (BAS) platform.
Find out more here.

Rapid7
5 Insights from the latest Cybersecurity trends research. (Blog Post)
Rapid7 is committed to promoting research that identifies the latest cybersecurity trends so that organisations can leverage these insights and created programs that make sense for the modern SOC. To that end, we’ve singled out five quick insights security professionals and stakeholders should consider when looking ahead. These findings are based on top trends in Cybersecurity for 2024, a new research report from Gartner.
Read more here.

Heimdal
Google Workspace: Cybersecurity Friend or Foe? (Blog Post)
Kevin Mitnick, once dubbed the Worlds most famous hacker said that “hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.” As defenders, it’s our job to put them out of business or, at the very least, provide some good sport. In this article, Heimdal explores how common tools such as those from the Google Workspace suit can lead to a full-fledge business compromise.
Find out more here.

Forescout
Bringing the Light into the Dark Places: Invisible Threats, Visible Solutions. (Blog Post)
What is the biggest cybersecurity challenge facing companies worldwide? The answer may vary depending on who you ask, but one indisputable fact remains clear: “What you can’t see, can and will hurt you”. Cyberthreats lurk in the depths of the digital world, constantly evolving, poised to strike unsuspecting victims. They often strike by compromising unseen connected devices which, experience has proven, represent up to 50% of all devices on a network.
To safeguard your business, it’s imperative to bring a light into the dark places by leveraging robust strategies and tools to protect your digital realm. This blog explores the significance of effective threat detection and response solutions and how they shield your organisation from the invisible dangers lurking in the digital shadows.
Read the full blog post here.

BullWall
NIS2: Stronger Cyber Defence for Europe. (Blog Post)
We live in a world where banking, healthcare, public transportation, and other critical services and agencies rely on computer systems. Computer systems which make them vulnerable to cyberattacks. To counter these threats the European Union has introduced NIS2, a set of rules designed to strengthen cybersecurity across Europe.
Read more here.

Kirsty Jones

Kirsty Jones

Marketing Executive

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL