
Nokia Data centre
Unlocking innovation with our new Nokia lab featuring Data Center Fabric technology
Discover how our Nokia Data Center Fabric lab empowers enterprises with automated and high-performance networking solutions. Validated, future-proof, and built for innovation.

Vincent de Knegt

SOC NOC
NOC vs SOC: The difference and why do you need both?
Discover the difference between an NOC and SOC, and why the collaboration between network management and cybersecurity is crucial for stable and secure IT environments.

Network infrastructure
Connecting Europe Tour - GÉANT
Welcome to "The Connecting Europe Tour"! Join Nat and Fraser, two young and curious entrepreneurs on an exciting journey across Europe, as they dive into the world of cutting-edge technology and innovation.

Cyber attacks Cybersecurity
CyberWednesday: Top 10 Cybersecurity Updates #17
Recent events underline once again that cyber security is not a one-off action, but an ongoing process. Only through a proactive approach can adequate resilience to cyber threats be ensured.

Juniper Networks
Juniper Networks launches EX4000 Series for modern campus networks
Juniper's EX4000 Series delivers AI-Native, high-speed, and secure campus networking with Mist AI, Zero Trust, and Wi-Fi 7 readiness.

Fortinet NGFW
Fortinet introduces new FortiGate 30G, 50G, and 70G firewalls
Fortinet launches FortiGate 30G, 50G, and 70G firewalls, offering AI-driven security, high performance, and energy efficiency for distributed organisations.

Cloud security Cybersecurity
Cloud Security Evolution: A Practitioner’s Journey
Cloud security is no longer just a practice but a strategic journey, requiring zero trust, automation, compliance focus, and proactive threat intelligence.

Ashley Pierre

OT security
Trends and expectations for OT security in 2025
The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2025.

Lance Flowerree

Cybersecurity
Cybersecurity in 2025: Top 10 Trends and Challenges
Cybersecurity 2025: AI threats, zero-days, supply chain risks, and human error demand smarter defences and robust strategies.

NGFW Firewall
Top 5 NGFW solutions for 2025
Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.

Enrico Bottos

Cybersecurity
Top cybersecurity companies to watch in 2025
We selected the top cybersecurity companies to watch in 2025, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi

Cybersecurity
The latest cybersecurity challenges
Explore the latest cybersecurity challenges, from AI-driven threats to quantum risks, impacting organisations in an evolving threat landscape.

Usman Khan

Juniper Networks Netwerkbeheer
Juniper introduces Secure AI-Native Edge solution for unified security and network management
Juniper's Secure AI-Native Edge solution integrates security and network management under Mist AI, enhancing operational efficiency, visibility, and protection.

Company update
Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital
Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital

Network infrastructure Juniper Networks
When only the toughest will do: Discover Juniper's EX4100-H Switch
The Juniper Networks EX4100-H Ethernet Switch delivers robust, AI-enhanced connectivity and security for demanding environments, ensuring reliable performance in extreme conditions.

NIS2
Achieving NIS2 compliance in industrial companies
Thousands of industrial companies will be affected by the implementation of NIS2, with issues varying widely from one entity to another. We present you 12 steps to achieve compliance.

Arnaud Masson

Network segmentation Network security
Prevent lateral compromise with micro-segmentation
Why network micro-segmentation matters for network security and how it helps mitigate the spread of lateral compromise.

Herwig Mertens

SASE
The missing piece of SASE - Prisma Access Browser
Prisma Access Browser from Palo Alto Networks offers integrated security and control within SASE for every user on any device, with reduced costs and complexity.

Jan-Willem Sipman
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.