
OT security
Why OT security is critical for energy and industrial operations
Protect OT systems in the oil and energy industry from ransomware, insider threats, and APTs with purpose-built cybersecurity for critical infrastructure.

Ahmed Mahmoud

SASE SSE
The alphabet soup of SASE: CASB vs. SWG, FWaaS, and more
Learn how SASE combines networking and cloud-delivered security tools like SWG, CASB, ZTNA, and FWaaS to protect users, apps, and data across your organisation.

Palo Alto Networks
Palo Alto acquires CyberArk to strengthen identity security
Palo Alto acquires CyberArk to boost identity security. Learn how this helps secure human and machine identities in AI-driven enterprise environments.

Optical networking
Upgrade to Optical LAN, how does it work and what does it cost?
Nokia’s Aurelis Optical LAN (POL) is a next-generation fibre-based solution that helps enterprises futureproof their networks, reduce operational costs, and meet ESG targets.

Vincent de Knegt

Cybersecurity
Traditional vs. Machine-led attack chains
A side-by-side comparison of the traditional cyber kill chain and the new machine-led attack chain, highlighting key differences and the implications for modern cybersecurity defences.

Usman

HPE Juniper Networks
HPE completes acquisition of Juniper Networks
HPE has completed its $14 billion acquisition of Juniper Networks, reshaping the enterprise networking landscape with a strong focus on AI-driven, cloud-managed infrastructure.

Enterprise networking
Gartner MQ 2025: Juniper, Fortinet and HPE take the lead in enterprise networking
Discover why Juniper, Fortinet and HPE lead the 2025 Gartner Magic Quadrant for Enterprise LAN. Explore their unique strengths — and how Nomios helps enterprises design, deploy and secure future-ready networks.

OT security Network security
Securing brownfield OT networks using a three-pronged approach
Discover how to secure brownfield OT networks with a practical, three-pronged strategy focused on visibility, legacy protection, and segmentation.

Lance Flowerree

OT security
Why legacy systems need a modern OT security strategy
Discover how effective OT cybersecurity strategies protect legacy systems, ensure operational continuity, and comply with evolving regulations like NIS2.

Lance Flowerree

Optical networking Nokia
10 key benefits of passive optical LAN for enterprise connectivity
Passive optical LAN has a lot of benefits for enterprise connectivity, speed and cost optimisation. Read the 10 benefits of passive optical LAN for enterprise connectivity.

Vincent de Knegt

Cybersecurity Hospitality
Protect your hotel and guests with a strong cybersecurity strategy
Hotels and accommodation providers process sensitive data on a daily basis and are an attractive target for cybercriminals. Discover how a strong cybersecurity strategy can protect your hotel and guests against data breaches, ransomware and other threats.

Marcel Hoogendoorn

SOC NOC
NOC vs SOC: The difference and why do you need both?
Discover the difference between an NOC and SOC, and why the collaboration between network management and cybersecurity is crucial for stable and secure IT environments.

Juniper Networks
Juniper Networks launches EX4000 Series for modern campus networks
Juniper's EX4000 Series delivers AI-Native, high-speed, and secure campus networking with Mist AI, Zero Trust, and Wi-Fi 7 readiness.

Fortinet NGFW
Fortinet introduces new FortiGate 30G, 50G, and 70G firewalls
Fortinet launches FortiGate 30G, 50G, and 70G firewalls, offering AI-driven security, high performance, and energy efficiency for distributed organisations.

SD-WAN
Top SD-WAN solutions
Discover the top SD-WAN solutions and how they enhance performance, flexibility, and security. Make informed choices for your network.

OT security
Trends and expectations for OT security in 2025
The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2025.

Lance Flowerree

Cybersecurity
The latest cybersecurity challenges
Explore the latest cybersecurity challenges, from AI-driven threats to quantum risks, impacting organisations in an evolving threat landscape.

Usman

Juniper Networks Network management
Juniper introduces Secure AI-Native Edge solution for unified security and network management
Juniper's Secure AI-Native Edge solution integrates security and network management under Mist AI, enhancing operational efficiency, visibility, and protection.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

