Achieving DORA Compliance with Redborder: A Strategic Approach
In an increasingly complex cybersecurity landscape, ensuring compliance with various regulations is critical to maintaining operational integrity and security. One such regulation ...
What You Need to Know About Cyber Threats in Q2 of 2025
Ransomware campaigns have ramped up aggressively, unleashing chaos in critical industries. Phishing attacks have grown smarter and more deceptive than ever before, fooling even the...
Hackers Are Raiding Your Aisles
The Retailer’s Survival Guide to Cybersecurity Let’s not sugarcoat it. If you're still treating cybersecurity as a side project in 2025, you might as well hang a “HACK ME” sign...
What We Learned from Monitoring 1 Billion Network Flows
At Redborder, we’ve crossed a major milestone: monitoring over 1 billion network flows. These flows come from a wide range of industries, including finance, healthcare, manufacturi...
Asset Visibility and Shadow IT Detection
What is Shadow IT? Shadow IT refers to the unauthorized use of technology within an organization, bypassing the oversight of the IT and security teams. This covers stuff like em...
What is Network Detection and Response (NDR)?
Network Detection and Response (NDR) began gaining significant traction and recognition in 2013 and 2014. This period saw the rise of network traffic analysis (NTA), machine learni...
Understanding Event-Driven Architecture (and combinations) in Software Engineering
What is Event-Driven Architecture? Event-Driven Architecture, or EDA in short form, is the architectural pattern of software engineering that comprises architecture guided by cr...
Artificial Intelligence in Cybersecurity
In the contemporary cybersecurity field, the evolution of artificial intelligence (AI)-driven threats is transforming the cyberattack landscape, equipping attackers with sophistica...