Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on our latest Webinar discussing Smarter Network Management, Emerging Cybersecurity Threats and Challenges, Unifying the SOC and the NOC, and much more.

KedronUK

Smarter Network Management – Migrating from Legacy NMS to StableNet®. (Webinar recording)
Is your current network management platform holding you back? Catch up on our latest webinar and discover how StableNet® unifies network & service management with automation, cost transparency, and proven migration support.

Download here.

Keysight Technologies

What the EU Cyber Resilience Act Means for Digital Product Makers. (Blog Post)
The EU Cyber Resilience Act (CRA) is set to become a defining regulation for all manufacturers and developers of digital products that touch the EU market. It introduces strict requirements for cybersecurity practices, risk management, and compliance procedures, affecting a wide range of stakeholders from software developers to hardware vendors. This article unpacks what the CRA is, who it affects, and how to get ready.

Find out more here.

Infosim

NCCM Vulnerability and End-of-Life with StableNet®. (Whitepaper)
StableNet‘s automated network and service management solution offers a highly effective approach to simplifying Network Configuration and Change Management (NCCM) by providing robust, automated inventory and discovery capabilities. The platform solution ensures that network visibility is comprehensive and current through customizable, regularly scheduled discovery jobs that automatically identify and document hardware details, interconnections, and dynamic Parameters like routing protocols and neighbourhood views. Beyond discovery, StableNet®‘s NCCM solution integrates automated backup and restore, policy compliance checks, and change Management processes into a cohesive, streamlined framework.

Download the whitepaper here.

SenseOn

6 Best Insider Threat Detection Tools. (Blog Post)
Sometimes the most dangerous security threats come from inside the firewall. A small minority of employees and other trusted individuals will compromise their organisations, whether by accident or design. Motivations for insider threats include:

  • Political or ideological reasons.
  • Profit and financial gain
  • Revenge after an incident or lack of recognition
  • Sabotaging other individuals within a workspace
  • Attempting to advance their careers
  • Negligence (for example, clicking on a phishing email).

Today, insider threats are common and can be devastating. Many organisations notice an insider threat has occurred long after the fact, such as in the event of intellectual property theft or when sensitive information is leaked online.

Read more here.

Rapid7

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond. (Blog Post)
The global threat landscape is undergoing an unprecedented transformation. Organisations are facing dizzying levels of complexity, driven by rapid technological innovation, the widespread adoption of artificial intelligence, and the expected disruptive effects of quantum computing. At the same time, shifting geopolitical dynamics, the rise of sophisticated cybercriminal networks, and the introduction of new regulatory frameworks are fundamentally reshaping how the private and public sectors must approach security.

Against this backdrop, this blog post examines the cyber threats expected to emerge within the next 3 to 5 years. It explores the challenges posed by these constantly evolving risks, analysing the technical aspects of cyber threats as well as the strategic, regulatory, and human factors that define the modern security landscape. Most importantly, it provides actionable insights that organisations can utilise to strengthen their cyber resilience.

Read the full blog post here.

BullWall

2026 Ransomware Resilience Benchmark Report. (Report)
Based on input from hundreds of security leaders, our 2026 Ransomware Resilience Benchmark Report is designed to help executives, security leaders, and boards understand:

  • How your organisations ransomware defences compare to peers
  • Where critical resilience gaps still exist
  • How requently organisations are being hit by ransomware
  • How the impact extends far beyond IT to operations, revenue, and reputations
  • The practical steps required to move from misplaced confidence to proven ransomware resilience

Download the report here.

ExtraHop

Unifying the SOC and the NOC for Stronger Cyber Resilience. (Blog Post)
Traditionally, Security Operations Centres (SOCs) and Network Operations Centres (NOCs) have operated as distinct entities, each with a specialised focus. SOCs are focused on protecting the organisation from cybersecurity threats, while NOCs are responsible for ensuring the continuous availability and performance of the organisation’s IT infrastructure.

Both the NOC and SOC exist to support the business. Their shared mission is to minimise disruptions and ensure that the organisation can continue its operations effectively and securely. Downtime, whether due to a network outage or a cyberattack, directly impacts productivity, revenue, and reputation. Without strong collaboration and unified tools, these intertwined issues can lead to delayed responses, increased damage, and a fundamentally incomplete understanding of the risk landscape.

Find out more here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.