How network detection and response can bridge the cyber gaps