Firewall vs NDR
Introduction: For those of you who don’t know what a Firewall does: It’s your perimeter guard, anything going to & from the internet is inspected by the Firewall and is e...
CyberCan: A Real Cybersecurity Solution for SMBs
For a long time, small and medium-sized businesses (SMBs) have been underserved when it comes to cybersecurity. Many solutions on the market are either too complex, too expensive o...
NDR in Metaphors: What Network Detection and Response Really Does
Cybersecurity is essential, but it can sound like a wall of techy buzzwords. So instead of explaining Network Detection and Response (NDR) with acronyms and protocol names, we’re g...
Achieving DORA Compliance with Redborder: A Strategic Approach
In an increasingly complex cybersecurity landscape, ensuring compliance with various regulations is critical to maintaining operational integrity and security. One such regulation ...
What You Need to Know About Cyber Threats in Q2 of 2025
Ransomware campaigns have ramped up aggressively, unleashing chaos in critical industries. Phishing attacks have grown smarter and more deceptive than ever before, fooling even the...
Hackers Are Raiding Your Aisles
The Retailer’s Survival Guide to Cybersecurity Let’s not sugarcoat it. If you're still treating cybersecurity as a side project in 2025, you might as well hang a “HACK ME” sign...
What We Learned from Monitoring 1 Billion Network Flows
At Redborder, we’ve crossed a major milestone: monitoring over 1 billion network flows. These flows come from a wide range of industries, including finance, healthcare, manufacturi...
Asset Visibility and Shadow IT Detection
What is Shadow IT? Shadow IT refers to the unauthorized use of technology within an organization, bypassing the oversight of the IT and security teams. This covers stuff like em...