EDR vs. XDR: A Practical Guide to Next-Gen Cybersecurity