
OT security
Trends and expectations for OT security in 2024
The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2024.

Rachid Groeneveld

Managed services Telco
Elevating operational technology security with managed PKI: A telco perspective
Managed PKI services simplify and secure digital identity and certificate management for telco operators transitioning to 5G.

NGFW Firewall
Top 5 NGFW solutions for 2024
Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks continue to become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.

Cybersecurity
Top cybersecurity companies to watch in 2024
We selected the top cybersecurity companies to watch in 2024, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi

SIEM
The benefits of outsourcing SIEM management
Explore the perks of SIEM outsourcing: scalability, expertise, cost savings, and continuous monitoring for superior cybersecurity.

Parm Dhillon

SASE SSE
The Alphabet Soup of SASE: CASB vs. SWG, FWaaS, and more
With a plethora of acronyms like SWG, CASB, and FWaaS filling the cybersecurity arena, it might seem like you've stumbled into a bowl of alphabet soup.

Load balancer ADC
Top load balancers to know in 2024
Load balancers provide the bedrock for building flexible networks that meet evolving demands by improving performance and security. We've selected four of the best load balancers for 2024.

API security
API security trends 2024
API security trends in 2024 emphasize adaptability and collaboration to address growing vulnerabilities as digital innovation accelerates.

Rachid Groeneveld

SSE SASE
SSE vs. SASE
The term Secure Services Edge (SSE) may sometimes be used interchangeably with Secure Access Service Edge (SASE), depending on the context. In general, both refer to an emerging cybersecurity model that combines networking and security functions into a unified, cloud-based architecture.

Cisco Splunk
Cisco and Splunk join forces to enhance organisational resilience
Cisco's $28B acquisition of cybersecurity leader Splunk promises enhanced security and innovation.

NAC Mist AI
Juniper Networks improves user experience with cloud-based NAC and Mist AI-ChatGPT integration.
Discover Juniper Networks' cloud-based NAC solution driven by Mist AI and the integration of ChatGPT, enhancing user support and AI-driven networking strategy.

Press release
Nomios and Nokia triple capacity for GÉANT European research network with renewal of IP backbone
A 10-year frame agreement pegs Nokia as the sole IP critical-network provider for massive backbone network migration for GÉANT led by partner Nomios.

Juniper Networks
Campus fabric fundamentals: Simpler, better, faster, stronger
From Day 0 to Day 2+, discover what an AI-driven campus fabric can do for you and your organisation in this blog.

Christian Gilby

Company update Press release
IK Partners enters into exclusive negotiations for the sale of Nomios to Keensight Capital
IK Partners is pleased to announce that the IK VIII Fund has entered into exclusivity negotiations to sell Nomios to Keensight Capital, one of the leading private equity managers dedicated to pan-European Growth Buyout investments.

NAC Mist AI
NAC is back and better than ever!
Juniper has expanded its Mist AI-driven enterprise portfolio, with Juniper Mist Access Assurance. It's a cloud-based NAC service that enables enterprises to easily enforce a Zero Trust security model without the challenges associated with on-premises NAC.

Jeff Aaron

Microsoft 365 Vectra
Securing Microsoft M365 and Azure Active Directory
Vectra Detect for Office 365 and Azure AD solutions dramatically improve visibility into M365 and Azure AD to detect attackers and act before it becomes a major security incident.

Cybersecurity E-mail security
How to prevent your organisation from becoming a victim of phishing?
To prevent phishing at your organisation, it is important to focus on three things: education, processes and technology.

Erik Biemans

Data centre Network automation
Top 5 benefits of data centre automation
There are many great benefits to data centre automation, here we’ve selected the top 5, which we think could make the biggest difference to your organisation.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.