What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Securing sensitive traffic in research networksSecuring sensitive traffic in research networks
Nokia

Network security

Securing sensitive traffic in research networks

How research and education networks secure sensitive traffic with line-rate encryption and real-time DDoS mitigation, without impacting performance or reliability.

Michel Geensen
Placeholder for Michel-GeensenMichel-Geensen

Michel Geensen

3 min. read
Placeholder for Nomios Cybersecurity portfolio 2026Nomios Cybersecurity portfolio 2026

Portfolio

Nomios Zero Trust: one cybersecurity portfolio, six domains

Nomios is introducing a refreshed cybersecurity portfolio that doesn’t start with individual products, but with an architecture.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

7 min. read
Placeholder for Understanding post-quantum cryptographyUnderstanding post-quantum cryptography

Quantum Security

Understanding how post-quantum cryptography works

Post-quantum cryptography replaces vulnerable public-key algorithms with quantum-resistant designs. Learn how PQC works, which algorithm families are used, and why it runs on classical systems.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

3 min. read
Placeholder for Man sitting behind screen reading about cybersecurity in 2026Man sitting behind screen reading about cybersecurity in 2026

Cybersecurity

Cybersecurity in 2026: Top 10 trends and challenges

Cybersecurity trends for 2026 cover digital sovereignty, quantum security, SSE and identity security, detection, compliance, and managing trust across complex environments.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

4 min. read
Placeholder for Man sitting behind laptop quantum computing threatMan sitting behind laptop quantum computing threat

Quantum Security

The quantum computing threat to today’s encryption

Quantum computing threatens today’s encryption. Learn how RSA and ECC are broken, what harvest now, decrypt later means, and why organisations need to prepare now.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

5 min. read
Placeholder for SASE handshakeSASE handshake

SSE IAM SASE

Single vendor SASE? It’s all about strategic partnerships

Across the market we see a clear shift towards single vendor SASE. Organisations want to simplify their IT landscape, reduce operational overhead, and gain better visibility across network and security.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

4 min. read
Placeholder for Cybersecurity companies 2025Cybersecurity companies 2025

Cybersecurity

Top cybersecurity companies to watch in 2026

We selected the top cybersecurity companies to watch in 2026, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi
Placeholder for Mohamed El HaddouchiMohamed El Haddouchi

Mohamed El Haddouchi

13 min. read
Placeholder for Engineer in SOCEngineer in SOC

Detection & Response SOC

How does AI modernise security operations?

Learn how AI enhances SecOps by reducing noise, accelerating investigations and strengthening the modern Security Operations Centre.

Nathan Oliver
Placeholder for NathanNathan

Nathan Oliver

3 min. read
Placeholder for EM Maturity ModelEM Maturity Model
Tenable

Exposure Management

Exploring the Cyber Exposure Management maturity model

Exposure management is becoming a central theme for organisations that want to move beyond traditional vulnerability workflows. At Nomios, we see this shift every day.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

3 min. read
Placeholder for Pexels pixabay 158826Pexels pixabay 158826
Palo Alto Networks

Palo Alto Networks Whitepaper

Rethinking the SOC for today’s threat landscape

Explore why organisations are moving away from traditional MSSP and SIEM models. The whitepaper shows how a Cortex-based SOC delivers clarity, speed, and better security outcomes.

1 min. read
Placeholder for Strata cloudStrata cloud
Palo Alto Networks

Palo Alto Networks

Why now is the time to migrate from Panorama to Strata Cloud Manager

With Strata Cloud Manager, Palo Alto Networks has introduced a cloud-native platform that brings management, automation, and visibility together. And now is the perfect time to make the move.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

3 min. read
Placeholder for Engineer working on network automationEngineer working on network automation

Network automation

Building trust in automation: why spreadsheets hold networks back

Discover why spreadsheets limit automation and how a trusted source of truth empowers modern network operations.

Adam Kirchberger
Placeholder for Adam KirchbergerAdam Kirchberger

Adam Kirchberger

2 min. read
Placeholder for Young engineer datacenter roomYoung engineer datacenter room

Network infrastructure

Why Wi-Fi site surveys matter more than ever

Reliable Wi-Fi has become essential in the modern workplace, not just a convenience. Poor coverage or unstable networks can disrupt productivity, collaboration, and critical services.

Giulio Quartero
Placeholder for Giulio QuarteroGiulio Quartero

Giulio Quartero

2 min. read
Placeholder for Engineers working on Managed PKIEngineers working on Managed PKI

Network security

PKI in practice: Use cases, challenges, and trade-offs

Explore PKI in practice: its use cases, challenges, trade-offs, and best practices for securing modern enterprise networks.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

3 min. read
Placeholder for LondonLondon

Nomios expands cybersecurity offering with the acquisition of Intragen, a European leader in IAM

Nomios acquires Intragen, a specialist in Identity and Access Management. The acquisition strengthens Nomios' position as a European leader in cybersecurity.

6 min. read
Placeholder for Managed SOC security engineer - MSSPManaged SOC security engineer - MSSP

Cyber attacks Ransomware

Modern ransomware: Obfuscation and fileless attacks explained

Discover advanced techniques used in modern ransomware: obfuscated code, fileless attacks and polymorphism. Protect your organisation with Nomios' modern SOC services.

Muhammed San
Placeholder for Muhammed SanMuhammed San

Muhammed San

4 min. read
Placeholder for Overloaded network teamOverloaded network team

Network management Mist AI

Overloaded network team? 3 signs that it's time for support

IT teams are often under pressure. No less than 85.8% of organisations are struggling with a shortage of qualified IT personnel. This staff shortage, combined with the increasing complexity of modern networks, is creating a workload that continues to grow.

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

7 min. read
Placeholder for IT supportIT support

Network management Network infrastructure

Future-proofing your network for security, efficiency, and growth

Future-proof your network with AI-driven solutions. Less downtime, more security and efficiency. Discover how simple modernisation can be!

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

5 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.