Nomios Group expands in Southern Europe with leading Italian cybersecurity expert Aditinet Read article

What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Barcelona streets from aboveBarcelona streets from above

Cisco

CVE security & management: vulnerability management by Cisco Kenna Security

Kenna Security's technology focuses on the different risks in order to better understand vulnerability management by prioritising them in order of importance.

Nicolas Tarenne
Placeholder for Nicolas TarenneNicolas Tarenne

Nicolas Tarenne

2 min. read
Placeholder for Two network engineers datacenterTwo network engineers datacenter

Mist AI Enterprise networking

Back to the office with a strong Wi-Fi connection

With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?

Jérôme Wezelenburg
Placeholder for Jerome WezelenburgJerome Wezelenburg

Jérôme Wezelenburg

3 min. read
Placeholder for Hetportretbureau LR T1 A5975Hetportretbureau LR T1 A5975

ITIL

Why ITIL can be applied at any level

Many organisations struggle with a proper ITIL implementation. But this best practice offers a range of solutions that can partly be implemented at one's own discretion.

Tom Jansen
Placeholder for Tom JansenTom Jansen

Tom Jansen

3 min. read
Placeholder for Explaining the importance of Zero TrustExplaining the importance of Zero Trust

Zero-Trust Palo Alto Networks

Why Zero Trust is essential in a post-pandemic world

The rapid transformation to hybrid work and hybrid networks/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world.

Kumar Ramachandran from Palo Alto
Placeholder for Kumar RamachandranKumar Ramachandran

Kumar Ramachandran from Palo Alto

5 min. read
Placeholder for Manufacturing employees factory laptopManufacturing employees factory laptop

OT security Fortinet

Global OT and cybersecurity report outlines key challenges for industrial organisations

Fortinet released the 2022 State of Operational Technology and Cybersecurity Report. The global report highlights the current state of OT security and provides a roadmap to better secure OT organisations.

4 min. read
Placeholder for Aerial view ship portAerial view ship port

Cisco Firewall

SecureX and Secure Firewall: Integration and automation to simplify security

New integrations between SecureX and Secure Firewall streamline processes and increase automation to simplify your security.

Aditya Sankar from Cisco
Placeholder for Aditya SankarAditya Sankar

Aditya Sankar from Cisco

4 min. read
Placeholder for Hetportretbureau LR T1 A5873Hetportretbureau LR T1 A5873

SASE Juniper Networks

Simplifying the SASE experience with Juniper Networks

With the addition of Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP), Juniper Secure Edge now provides full-stack SSE capabilities, simplifying the SASE experience for customers.

Samantha Madrid from Juniper Networks
Placeholder for Female5Female5

Samantha Madrid from Juniper Networks

5 min. read
Placeholder for Cybersecurity engineer datacenterCybersecurity engineer datacenter

Trellix XDR

Cyber readiness & XDR: Progress, challenges & opportunities

Trellix pays particularly close attention to how EDR and XDR are being implemented across the public and private sectors.

7 min. read
Placeholder for Aerial view hanging bridgeAerial view hanging bridge

Cloud security

Forcepoint's vision of converged and engaged security

Forcepoint's vision of converged security delivers converged network, web and application security services in the cloud and native data protection for a more modern cyber security infrastructure to globally distributed organisations.

Vincent Guillot
Placeholder for Vincent GuillotVincent Guillot

Vincent Guillot

4 min. read
Placeholder for Office network engineersOffice network engineers

WAF F5 Networks

WAF technology needs to adapt now that apps are increasingly distributed

As workload deployments expand across diverse environments and app architectures, organisations want to be able to enforce consistent security controls across all applications, anywhere.

Frank Kyei-Manu from F5
Placeholder for Frank kyei manuFrank kyei manu

Frank Kyei-Manu from F5

4 min. read
Placeholder for Security engineer glasses closeupSecurity engineer glasses closeup

Zero-Trust ZTNA

ZTNA 1.0 vs ZTNA 2.0

ZTNA 2.0 provides a new era of secure access. It solves trust problems by removing implicit trust to help ensure organisations are properly secured.

4 min. read
Placeholder for Cybersafe travelCybersafe travel

Cybersecurity

Tips to stay cybersafe during your travels

Are you going on vacation or travelling for work? Make sure all your devices stay cybersafe during your travels. We give you tips on how to do this.

Jonas Walker from Fortinet
Placeholder for Male8Male8

Jonas Walker from Fortinet

8 min. read
Placeholder for Smiling engineer whiteboardSmiling engineer whiteboard

Cisco

Cisco Catalyst switches get Meraki cloud management

Cisco is taking a major step toward bringing a full cloud-managed enterprise networking solution to market by connecting its Catalyst switching and wireless hardware to the Meraki dashboard.

3 min. read
Placeholder for Cloud architect developerCloud architect developer

Zero Touch Provisioning Juniper Networks

Case study: Using Juniper Zero Touch Provisioning with Raspberry PI 4

With Zero Touch Provisioning (ZTP) you can automatically provision new Juniper Networks devices in your network with very little manual interaction. In this case study, we discuss the use of Raspberry PI as an FTP and DHCP server.

Eslam Eid Hassan
Placeholder for Eslam Eid HassanEslam Eid Hassan

Eslam Eid Hassan

3 min. read
Placeholder for Office building by nightOffice building by night

Juniper Networks

Juniper Networks offers new Secure Edge CASB and DLP capabilities to simplify the SASE experience

Juniper uniquely delivers full-stack SASE with a complete suite of Secure Edge SSE capabilities, unified security management and the only SD-WAN solution driven by Mist AI.

4 min. read
Placeholder for Person walking down the stairsPerson walking down the stairs

Cisco SD-WAN

SD-WAN performance and network security managed in the cloud via Cisco Meraki

Our engineers have developed the technical expertise to address our customers' network performance and security challenges using Cisco SD-WAN powered by Meraki technology.

Nicolas Tarenne
Placeholder for Nicolas TarenneNicolas Tarenne

Nicolas Tarenne

5 min. read
Placeholder for AI-driven enterpriseAI-driven enterprise

Juniper Networks AI-driven enterprise

What is an AI-driven enterprise?

The growing maturity and availability of artificial intelligence (AI) enables the creation of an AI-driven enterprise. Read how Nomios and Juniper can help you build one.

Jérôme Wezelenburg
Placeholder for Jerome WezelenburgJerome Wezelenburg

Jérôme Wezelenburg

9 min. read
Placeholder for Roundabout road carsRoundabout road cars

SOAR SIEM

SIEM or SOAR?

Do you already have a SIEM system implemented in your organisation? Does that mean SOAR is not for you? Well, no. Let's discover why.

Tomasz Jurkowski
Placeholder for Tomasz JurkowskiTomasz Jurkowski

Tomasz Jurkowski

3 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.