What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Best XDR solutionsBest XDR solutions

XDR Cybersecurity

Best XDR solutions to check out

Almost 70% of breaches start from endpoints, highlighting the need for robust security measures, such as XDR.

Inès Khabkhabi
Placeholder for Ines khabkhabiInes khabkhabi

Inès Khabkhabi

16 min. read
Placeholder for I Stock 157531192I Stock 157531192

SSE

Comparison of the SSE Magic Quadrant™ 2023 vs 2024

When comparing the SSE Magic Quadrant™ of 2023 with that of 2024, several developments are notable. Palo Alto Networks has strengthened its position as a leader, while Zscaler and Netskope have generally maintained their position at the highest level.

Romain Quinat
Placeholder for Romain QuinatRomain Quinat

Romain Quinat

6 min. read
Placeholder for Adobe Stock 369977292Adobe Stock 369977292
Juniper Networks

Network security

Juniper's Four-Time Leadership in Gartner Magic Quadrant

Juniper Networks' repeated leadership in Gartner's Magic Quadrant highlights its innovative edge and excellence in wired, wireless, and indoor location technologies.

3 min. read
Placeholder for Industrial company NIS2Industrial company NIS2

NIS2

NIS2 requires industrial companies to make major efforts to secure their OT environments: Where to start?

Thousands of industrial companies will be affected by the implementation of NIS2, with issues varying widely from one entity to another. We present you 12 steps to achieve compliance.

Arnaud Masson
Placeholder for ARMARM

Arnaud Masson

4 min. read
Placeholder for Manufacturing robotic armManufacturing robotic arm
Juniper Networks

Juniper Networks AI-driven enterprise

What is an AI-driven enterprise?

The growing maturity and availability of artificial intelligence (AI) enables the creation of an AI-driven enterprise. Read how Nomios and Juniper can help you build one.

9 min. read
Placeholder for Two men looking at a laptopTwo men looking at a laptop

Cloud security Endpoint security

The importance of Secure Web Gateway (SWG)

This article introduces Secure Web Gateways (SWG), covering key features, deployment options, scalability, organizational benefits, and integration.

2 min. read
Placeholder for Andrea de santis Zr N5oxcg Lkw unsplashAndrea de santis Zr N5oxcg Lkw unsplash
Juniper Networks

AI-driven enterprise

From technology to transformation: The impact of AI on today's enterprises

An AI-driven enterprise leverages automation, data-driven insights, and enhanced engagement to fundamentally transform its operations and stay ahead of the curve.

2 min. read
Placeholder for I Stock 157531192I Stock 157531192
Juniper Networks

Cybersecurity Artificial Intelligence

AI in cybersecurity: A double-edged sword

AI enhances cybersecurity with quicker threat identification, proactive measures, and automated efficiency, yet presents challenges like evolving threats, ethical concerns, and a skills gap, necessitating a comprehensive defense approach.

3 min. read
Placeholder for Juniper AI-Native Networking PlatformJuniper AI-Native Networking Platform
Juniper Networks

Mist AI AI-driven enterprise

What is the new Juniper AI-Native Networking Platform?

Juniper Networks' AI-Native Networking Platform, including Marvis Minis, revolutionises network management with AI-driven efficiency and proactive problem-solving.

2 min. read
Placeholder for Shadow ITShadow IT

Network automation

How automation centralises your tools and processes: A journey towards enhanced IT efficiency

Automation transforms IT roles, centralizing tools for efficiency, fostering innovation, and ushering in a new era of strategic growth in the sector.

2 min. read
Placeholder for Adobe Stock 598538455Adobe Stock 598538455

SIEM

8 factors you should consider before implementing SIEM

Implementing a SIEM system involves key steps like defining objectives, ensuring compatibility, calculating costs, assessing skills, ensuring compliance, evaluating infrastructure, selecting a reliable vendor, and future-proofing for cybersecurity.

2 min. read
Placeholder for Joshua coleman ygp2y U QMEQ unsplashJoshua coleman ygp2y U QMEQ unsplash

Juniper Networks HPE

HPE's strategic leap with Juniper Networks acquisition

Hewlett Packard Enterprise's (HPE) decision to acquire Juniper Networks for an estimated $14 billion is a testament to its strategic foresight in the evolving landscape of AI-driven networking.

3 min. read
Placeholder for Engineer focused on taskEngineer focused on task

Cybersecurity

Secure your future: Top cybersecurity trends for 2024

We’re on the brink of a new year again. Time to learn all about the most important and interesting cybersecurity trends for 2024.

Mohamed El Haddouchi
Placeholder for Mohamed El HaddouchiMohamed El Haddouchi

Mohamed El Haddouchi

10 min. read
Placeholder for DMARC google yahoo emailsDMARC google yahoo emails

Email security

DMARC - From February 2024 your emails to gmail and yahoo could be rejected

By February 2024, Google and Yahoo will be imposing strict new rules on email security. Companies will be required to adopt DMARC authentication technology.

Romain Quinat
Placeholder for Romain QuinatRomain Quinat

Romain Quinat

3 min. read
Placeholder for Looking at SOC security trendsLooking at SOC security trends

SOC NOC

NOC vs SOC: Unveiling differences and uniting strengths

NOC and SOC are essential in digital enterprises, combining network management with cybersecurity for resilient IT operations.

4 min. read
Placeholder for Pascal meier X Ml VD Tu E Hpg unsplashPascal meier X Ml VD Tu E Hpg unsplash

SD-WAN

Top 5 SD-WAN solutions for 2024

Discover the top SD-WAN solutions for 2024 and how they enhance performance, flexibility, and security. Make informed choices for your network.

8 min. read
Placeholder for Looking at SOC security trendsLooking at SOC security trends

SOC Cybersecurity

Navigating the 2024 cybersecurity landscape: Key trends in SOC security

A security operations centre (SOC) offers the security tools and knowledge that you need to keep your IT environment safe. Read all about the SOC security trends of 2024.

Avinash Shet
Placeholder for Avinash shetAvinash shet

Avinash Shet

5 min. read
Placeholder for Operational Technology (OT)Operational Technology (OT)

OT security

Trends and expectations for OT security in 2024

The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2024.

Rachid Groeneveld
Placeholder for Rachid GroeneveldRachid Groeneveld

Rachid Groeneveld

10 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.