
Network security
Securing sensitive traffic in research networks
How research and education networks secure sensitive traffic with line-rate encryption and real-time DDoS mitigation, without impacting performance or reliability.

Michel Geensen

Portfolio
Nomios Zero Trust: one cybersecurity portfolio, six domains
Nomios is introducing a refreshed cybersecurity portfolio that doesn’t start with individual products, but with an architecture.

Richard Landman

Quantum Security
Understanding how post-quantum cryptography works
Post-quantum cryptography replaces vulnerable public-key algorithms with quantum-resistant designs. Learn how PQC works, which algorithm families are used, and why it runs on classical systems.

Priyanka Gahilot

Cybersecurity
Cybersecurity in 2026: Top 10 trends and challenges
Cybersecurity trends for 2026 cover digital sovereignty, quantum security, SSE and identity security, detection, compliance, and managing trust across complex environments.

Richard Landman

Quantum Security
The quantum computing threat to today’s encryption
Quantum computing threatens today’s encryption. Learn how RSA and ECC are broken, what harvest now, decrypt later means, and why organisations need to prepare now.

Priyanka Gahilot

SSE IAM SASE
Single vendor SASE? It’s all about strategic partnerships
Across the market we see a clear shift towards single vendor SASE. Organisations want to simplify their IT landscape, reduce operational overhead, and gain better visibility across network and security.

Richard Landman

Cybersecurity
Top cybersecurity companies to watch in 2026
We selected the top cybersecurity companies to watch in 2026, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi

Detection & Response SOC
How does AI modernise security operations?
Learn how AI enhances SecOps by reducing noise, accelerating investigations and strengthening the modern Security Operations Centre.

Nathan Oliver

Exposure Management
Exploring the Cyber Exposure Management maturity model
Exposure management is becoming a central theme for organisations that want to move beyond traditional vulnerability workflows. At Nomios, we see this shift every day.

Richard Landman

Palo Alto Networks Whitepaper
Rethinking the SOC for today’s threat landscape
Explore why organisations are moving away from traditional MSSP and SIEM models. The whitepaper shows how a Cortex-based SOC delivers clarity, speed, and better security outcomes.

Palo Alto Networks
Why now is the time to migrate from Panorama to Strata Cloud Manager
With Strata Cloud Manager, Palo Alto Networks has introduced a cloud-native platform that brings management, automation, and visibility together. And now is the perfect time to make the move.

Richard Landman

Network automation
Building trust in automation: why spreadsheets hold networks back
Discover why spreadsheets limit automation and how a trusted source of truth empowers modern network operations.

Adam Kirchberger

Network infrastructure
Why Wi-Fi site surveys matter more than ever
Reliable Wi-Fi has become essential in the modern workplace, not just a convenience. Poor coverage or unstable networks can disrupt productivity, collaboration, and critical services.

Giulio Quartero

Network security
PKI in practice: Use cases, challenges, and trade-offs
Explore PKI in practice: its use cases, challenges, trade-offs, and best practices for securing modern enterprise networks.

Priyanka Gahilot

Nomios expands cybersecurity offering with the acquisition of Intragen, a European leader in IAM
Nomios acquires Intragen, a specialist in Identity and Access Management. The acquisition strengthens Nomios' position as a European leader in cybersecurity.

Cyber attacks Ransomware
Modern ransomware: Obfuscation and fileless attacks explained
Discover advanced techniques used in modern ransomware: obfuscated code, fileless attacks and polymorphism. Protect your organisation with Nomios' modern SOC services.

Muhammed San

Network management Mist AI
Overloaded network team? 3 signs that it's time for support
IT teams are often under pressure. No less than 85.8% of organisations are struggling with a shortage of qualified IT personnel. This staff shortage, combined with the increasing complexity of modern networks, is creating a workload that continues to grow.

Michel Adelaar

Network management Network infrastructure
Future-proofing your network for security, efficiency, and growth
Future-proof your network with AI-driven solutions. Less downtime, more security and efficiency. Discover how simple modernisation can be!

Michel Adelaar
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

