What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Cloud architect developer implementing ddos protectionCloud architect developer implementing ddos protection

Anti-DDoS

Top DDoS protection solutions that should be on your radar

Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS attacks. These should be on your radar!

8 min. read
Placeholder for CISO and lawyer office discussionCISO and lawyer office discussion

NIS2

NIS2 advice to CISOs

As a CISO, it is important to understand the requirements of the NIS2 Directive and ensure that your company is compliant in a timely manner.

5 min. read
Placeholder for Adobe Stock 105368170Adobe Stock 105368170

Company

Nomios Group expands in Southern Europe with leading Italian cybersecurity expert Aditinet

The acquisition of Aditinet strengthens Nomios’ European position as one of the leading cybersecurity service companies.

Sébastien Kher
Placeholder for Sebastien KherSebastien Kher

Sébastien Kher

2 min. read
Placeholder for Silicon chip shortageSilicon chip shortage

Network automation

Automation now: Why the silicon shortage is an opportunity, not a crisis

While it’s easy to view the silicon chip shortage as a massive headache, long production waiting times could actually be a significant opportunity for your business to innovate.

Adam Kirchberger
Placeholder for Adam KirchbergerAdam Kirchberger

Adam Kirchberger

6 min. read
Placeholder for Nomios Juniper partner of the yearNomios Juniper partner of the year
Juniper Networks

Juniper Networks Award

Nomios wins Juniper Networks Worldwide Partner of the Year award

On 2 February 2023, during the Juniper Networks Partner Executive Summit in Madrid, Nomios was named Juniper Networks Partner of the Year award for 2022.

2 min. read
Placeholder for Hetportretbureau LR T1 A5873Hetportretbureau LR T1 A5873
Juniper Networks

SASE Juniper Networks

Simplifying the SASE experience with Juniper Networks

With the addition of Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP), Juniper Secure Edge now provides full-stack SSE capabilities, simplifying the SASE experience for customers.

Samantha Madrid
Placeholder for Samantha MadridSamantha Madrid

Samantha Madrid

5 min. read
Placeholder for Juniper Leader Gartner MQ wired and wireless LANJuniper Leader Gartner MQ wired and wireless LAN

Juniper Networks

Juniper Networks Leader in Gartner's MQ for enterprise wired and wireless LAN infrastructure

We are proud to say that our partner Juniper Networks is positioned furthest in both ability to execute and completeness of vision in the MQ for enterprise wired and wireless LAN infrastructure.

7 min. read
Placeholder for Cybersecurity engineers looking at latest cybersecurity challengesCybersecurity engineers looking at latest cybersecurity challenges

MDR

Why MDR services are essential to modern cybersecurity efforts

Want to counter cybersecurity threats, have an intel agency at your disposal, and do all of this at a predictable cost? Then MDR security services are the solution for you.

Erik Biemans
Placeholder for Erik BiemansErik Biemans

Erik Biemans

7 min. read
Placeholder for Rainbow housesRainbow houses
Noname Security

API security

API security, are you prepared?

The use of APIs has evolved in recent years, especially through smartphone use, making API security essential.

Matthieu Millot
Placeholder for Matthieu MilotMatthieu Milot

Matthieu Millot

4 min. read
Placeholder for Katya austin I4 Ys I1z Wq w unsplashKatya austin I4 Ys I1z Wq w unsplash

Netwerkbeheer

Top 5 reasons to outsource network management

Network management is probably one of the most important components when mapping your organisation's IT infrastructure. Outsourcing is a great way to free up your internal IT team to focus on day-to-day operations and strategic goals.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

3 min. read
Placeholder for Male and female engineer discussionMale and female engineer discussion

Network automation

Wifi networks and the rise of ai

Wi-Fi has been undergoing major changes recently, partly due to working from home. We compare 4 major Wi-Fi vendors and the use of AI.

3 min. read
Placeholder for Shark threatShark threat

Cyber attacks Cloud security

Top cybersecurity threats to be aware of

Cybersecurity threats are part of everyday life, such as attacks on IoT, phishing scams and ransomware attacks. Make sure your business is safe from these threats.

6 min. read
Placeholder for Retail shopper bags smartphoneRetail shopper bags smartphone

Zero-Trust

The password problem

What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.

Rachid Groeneveld
Placeholder for Rachid GroeneveldRachid Groeneveld

Rachid Groeneveld

8 min. read
Placeholder for Engineers manufacturingEngineers manufacturing

OT security

Top five OT security threats

These OT security threats provide an overview of critical and most common cyber threats to Operational Technology.

9 min. read
Placeholder for Cover cyber espionage 1024x538Cover cyber espionage 1024x538
TEHTRIS

TEHTRIS Cybersecurity

Protect your strategic data against industrial cyber-espionage

To prevent industrial cyber-espionage it is important to identify the risks (human, hardware, software), prevent and detect and hinder.

7 min. read
Placeholder for Problem managementProblem management

Problem management ITIL

Problem management: tools cannot give you wisdom

As long as there are no tools that think for us, problem management will largely be a human activity, where the combination of technical skills and soft skills is greater than ever.

Tom Jansen
Placeholder for Tom JansenTom Jansen

Tom Jansen

4 min. read
Placeholder for Barcelona streets from aboveBarcelona streets from above
Cisco

Cisco

CVE security & management: vulnerability management by Cisco Kenna Security

Kenna Security's technology focuses on the different risks in order to better understand vulnerability management by prioritising them in order of importance.

Nicolas Tarenne
Placeholder for Nicolas TarenneNicolas Tarenne

Nicolas Tarenne

2 min. read
Placeholder for Two network engineers datacenterTwo network engineers datacenter
Juniper Networks

Mist AI Enterprise networking

Back to the office with a strong Wi-Fi connection

With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?

3 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.