Why CMDB is the Brain of Our NDR and NPM Platform
What is CMDB? Good question, Configuration Management Database (CMDB). Why do you need one? Well a network on its own is just movement. It’s packets flowing, sessions opening and c...
What is CMDB? Good question, Configuration Management Database (CMDB). Why do you need one? Well a network on its own is just movement. It’s packets flowing, sessions opening and c...
Most security stacks were built on a pretty simple belief: If you secure the endpoint, monitor the perimeter and collect enough logs… you’ll see the attack coming. That belief i...
It's mid-March 2026. Your SOC just became a mosh pit. Not one alert. Not two. A full cascade and somewhere in that wall of noise, there's a lateral movement signal that's either a...
2026 is in full swing and the cyber-scape is hotter than ever. Hackers are smarter (and more ruthless), AI is faster and one weak link can cost millions. Here’s a crash course in ...
Cyberattacks don’t start with“!!! PAY 10 BITCOIN TO WALLET X !!!”. There’s no warnings, just a bunch of credentials slipping out of memory and into the hands of someone who very m...
If you work in cybersecurity, you probably don’t need a reminder that 2025 was a wild one. More alerts. More tools. More “AI-powered” promises. Yet, when something genuinely ser...
Cyber threats are no longer occasional disruptions, they’re relentless and increasingly invisible. When an attack happens, how quickly can your team detect it and respond? Redbo...
Last week, I had the privilege of attending a cybersecurity conference at Portcullis House in Westminster, London. From the moment I walked in, the venue set a serious tone. I went...
Cybersecurity terminology is quite often very confusing. Organizations are told they need EDR, they need NDR, oh and they need XDR, but what does each one actually do, and how do t...
Cybersecurity is evolving. At the core of this evolution is Knowledge Automation Security (KAS), a new era of technology that changes how we detect and respond to network threats. ...
© Copyright 2025. All Rights Reserved | Privacy Policy | Cookie Policy