What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Identity securityIdentity security

Identity management

Identity security in a changing IT landscape

For a long time, identity was the neglected part of IT security. User accounts, groups and permissions were necessary to keep systems running, but rarely the subject of strategic security decisions.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

3 min. read
Placeholder for I Stock 491561498I Stock 491561498

Zero-Trust Identity management

Why identity is the engine of zero trust

Identity is the engine of zero trust: learn how IAM, PAM and IGA enable continuous verification, reduce risk from privileged access, and strengthen identity hygiene across cloud and hybrid environments.

Mostafa Kamel
Placeholder for Mostafa kamelMostafa kamel

Mostafa Kamel

5 min. read
Placeholder for I love DDII love DDI
Infoblox

DDI

The silent weakness in higher education IT security

While universities and colleges are investing heavily in cloud, identity management and zero trust, a crucial part of the digital infrastructure remains conspicuously overlooked: DNS and DDI.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

2 min. read
Placeholder for Firefly Gemini Flash Large stage for a rock concert with a raving crowd and lights smoke and a large LED 443531Firefly Gemini Flash Large stage for a rock concert with a raving crowd and lights smoke and a large LED 443531

SASE

Not all SASE is created equal

If you look beyond marketing terms, you will see that SASE solutions differ fundamentally in design and approach.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

3 min. read
Placeholder for App cloakingApp cloaking

Cloaking

App Cloaking: the invisibility cloak for sensitive applications

I first came across the term app cloaking while colleagues of mine were working on a security solution for a large international law firm. The phrase stuck with me.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

3 min. read
Placeholder for PKI strategic pillarPKI strategic pillar

PKI

Why PKI is becoming a strategic pillar of modern cybersecurity

It often starts with something small. An application that suddenly becomes unavailable. An API integration that fails without a clear reason.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

4 min. read
Placeholder for Thumbnail day 1 1Thumbnail day 1 1

Enterprise networking HPE

HPE Discover Barcelona 2025: Insights from the show floor

Nomios was on site at HPE Discover Barcelona 2025, joining customers, partners and HPE leaders at one of the most influential events in the networking and infrastructure calendar.

2 min. read
Placeholder for Hetportretbureau HR T1 A0032 1Hetportretbureau HR T1 A0032 1

NGFW Firewall

Top 5 NGFW solutions for 2026

Explore the state of NGFW in 2026. Learn how leading next-generation firewall platforms support zero trust, hybrid cloud security, and risk reduction for modern enterprises.

Enrico Bottos
Placeholder for Enrico BottosEnrico Bottos

Enrico Bottos

7 min. read
Placeholder for Secure enterprise browserSecure enterprise browser
Palo Alto Networks

Browser

The browser as a strategic component of the security ecosystem

Over the past year, market momentum has clearly accelerated. Leading SASE and cybersecurity vendors are now explicitly positioning the browser as a core part of their platform strategies.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

3 min. read
Placeholder for Digital sovereignty - pkiDigital sovereignty - pki
Thales

Cryptography PKI

The plug and the key: A pragmatic view on digital sovereignty

Digital sovereignty has rapidly moved in Europe from an abstract policy concept to a concrete board-level topic. This has little to do with buzzwords and everything to do with geopolitics.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

5 min. read
Placeholder for Securing sensitive traffic in research networksSecuring sensitive traffic in research networks
Nokia

Network security

Securing sensitive traffic in research networks

How research and education networks secure sensitive traffic with line-rate encryption and real-time DDoS mitigation, without impacting performance or reliability.

Michel Geensen
Placeholder for Michel-GeensenMichel-Geensen

Michel Geensen

3 min. read
Placeholder for Nomios Cybersecurity portfolio 2026Nomios Cybersecurity portfolio 2026

Portfolio

Nomios Zero Trust: one cybersecurity portfolio, six domains

Nomios is introducing a refreshed cybersecurity portfolio that doesn’t start with individual products, but with an architecture.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

7 min. read
Placeholder for Understanding post-quantum cryptographyUnderstanding post-quantum cryptography

Quantum Security

Understanding how post-quantum cryptography works

Post-quantum cryptography replaces vulnerable public-key algorithms with quantum-resistant designs. Learn how PQC works, which algorithm families are used, and why it runs on classical systems.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

3 min. read
Placeholder for Man sitting behind screen reading about cybersecurity in 2026Man sitting behind screen reading about cybersecurity in 2026

Cybersecurity

Cybersecurity in 2026: Top 10 trends and challenges

Cybersecurity trends for 2026 cover digital sovereignty, quantum security, SSE and identity security, detection, compliance, and managing trust across complex environments.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

4 min. read
Placeholder for Man sitting behind laptop quantum computing threatMan sitting behind laptop quantum computing threat

Quantum Security

The quantum computing threat to today’s encryption

Quantum computing threatens today’s encryption. Learn how RSA and ECC are broken, what harvest now, decrypt later means, and why organisations need to prepare now.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

5 min. read
Placeholder for SASE handshakeSASE handshake

SSE IAM SASE

Single vendor SASE? It’s all about strategic partnerships

Across the market we see a clear shift towards single vendor SASE. Organisations want to simplify their IT landscape, reduce operational overhead, and gain better visibility across network and security.

Richard Landman
Placeholder for Richard landmanRichard landman

Richard Landman

4 min. read
Placeholder for Cybersecurity companies 2025Cybersecurity companies 2025

Cybersecurity

Top cybersecurity companies to watch in 2026

We selected the top cybersecurity companies to watch in 2026, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi
Placeholder for Mohamed El HaddouchiMohamed El Haddouchi

Mohamed El Haddouchi

13 min. read
Placeholder for Engineer in SOCEngineer in SOC

Detection & Response SOC

How does AI modernise security operations?

Learn how AI enhances SecOps by reducing noise, accelerating investigations and strengthening the modern Security Operations Centre.

Nathan Oliver
Placeholder for NathanNathan

Nathan Oliver

3 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.