What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Offshore windmill parkOffshore windmill park

OT security

Why OT security is critical for energy and industrial operations

Protect OT systems in the oil and energy industry from ransomware, insider threats, and APTs with purpose-built cybersecurity for critical infrastructure.

Ahmed Mahmoud
Placeholder for Ahmed MahmoudAhmed Mahmoud

Ahmed Mahmoud

5 min. read
Placeholder for SASE alphabet soupSASE alphabet soup

SASE SSE

The alphabet soup of SASE: CASB vs. SWG, FWaaS, and more

Learn how SASE combines networking and cloud-delivered security tools like SWG, CASB, ZTNA, and FWaaS to protect users, apps, and data across your organisation.

5 min. read
Placeholder for Facade modern buildingFacade modern building
Palo Alto Networks

Palo Alto Networks

Palo Alto acquires CyberArk to strengthen identity security

Palo Alto acquires CyberArk to boost identity security. Learn how this helps secure human and machine identities in AI-driven enterprise environments.

1 min. read
Placeholder for Overhead cablingpngOverhead cablingpng
Nokia

Optical networking

Upgrade to Optical LAN, how does it work and what does it cost?

Nokia’s Aurelis Optical LAN (POL) is a next-generation fibre-based solution that helps enterprises futureproof their networks, reduce operational costs, and meet ESG targets.

Vincent de Knegt
Placeholder for Vincent de KnegtVincent de Knegt

Vincent de Knegt

3 min. read
Placeholder for Traditional vs. machine-led attack chainsTraditional vs. machine-led attack chains

Cybersecurity

Traditional vs. Machine-led attack chains

A side-by-side comparison of the traditional cyber kill chain and the new machine-led attack chain, highlighting key differences and the implications for modern cybersecurity defences.

Usman
Placeholder for UsmanUsman

Usman

6 min. read
Placeholder for Adobe Stock 88542959Adobe Stock 88542959

HPE Juniper Networks

HPE completes acquisition of Juniper Networks

HPE has completed its $14 billion acquisition of Juniper Networks, reshaping the enterprise networking landscape with a strong focus on AI-driven, cloud-managed infrastructure.

3 min. read
Placeholder for Man sitting behind screen reading about cybersecurity in 2026Man sitting behind screen reading about cybersecurity in 2026

Enterprise networking

Gartner MQ 2025: Juniper, Fortinet and HPE take the lead in enterprise networking

Discover why Juniper, Fortinet and HPE lead the 2025 Gartner Magic Quadrant for Enterprise LAN. Explore their unique strengths — and how Nomios helps enterprises design, deploy and secure future-ready networks.

4 min. read
Placeholder for Manufacturing factory worker laptopManufacturing factory worker laptop

OT security Network security

Securing brownfield OT networks using a three-pronged approach

Discover how to secure brownfield OT networks with a practical, three-pronged strategy focused on visibility, legacy protection, and segmentation.

Lance Flowerree
Placeholder for Lance flowerreeLance flowerree

Lance Flowerree

3 min. read
Placeholder for Manufacturing engineersManufacturing engineers

OT security

Why legacy systems need a modern OT security strategy

Discover how effective OT cybersecurity strategies protect legacy systems, ensure operational continuity, and comply with evolving regulations like NIS2.

Lance Flowerree
Placeholder for Lance flowerreeLance flowerree

Lance Flowerree

4 min. read
Placeholder for Woman in coffee house laptopWoman in coffee house laptop
Nokia

Optical networking Nokia

10 key benefits of passive optical LAN for enterprise connectivity

Passive optical LAN has a lot of benefits for enterprise connectivity, speed and cost optimisation. Read the 10 benefits of passive optical LAN for enterprise connectivity.

Vincent de Knegt
Placeholder for Vincent de KnegtVincent de Knegt

Vincent de Knegt

7 min. read
Placeholder for Hospitality cybersecurity strategyHospitality cybersecurity strategy

Cybersecurity Hospitality

Protect your hotel and guests with a strong cybersecurity strategy

Hotels and accommodation providers process sensitive data on a daily basis and are an attractive target for cybercriminals. Discover how a strong cybersecurity strategy can protect your hotel and guests against data breaches, ransomware and other threats.

Marcel Hoogendoorn
Placeholder for Marcel HoogendoornMarcel Hoogendoorn

Marcel Hoogendoorn

3 min. read
Placeholder for Cyber security engineers smilingCyber security engineers smiling

SOC NOC

NOC vs SOC: The difference and why do you need both?

Discover the difference between an NOC and SOC, and why the collaboration between network management and cybersecurity is crucial for stable and secure IT environments.

3 min. read
Placeholder for Person walking on white floor tiles scopio 4b10bfbb dcf5 4e1d a1fe ed31771f934cPerson walking on white floor tiles scopio 4b10bfbb dcf5 4e1d a1fe ed31771f934c
Juniper Networks

Juniper Networks

Juniper Networks launches EX4000 Series for modern campus networks

Juniper's EX4000 Series delivers AI-Native, high-speed, and secure campus networking with Mist AI, Zero Trust, and Wi-Fi 7 readiness.

2 min. read
Placeholder for Datacenter hall blue lightDatacenter hall blue light
Fortinet

Fortinet NGFW

Fortinet introduces new FortiGate 30G, 50G, and 70G firewalls

Fortinet launches FortiGate 30G, 50G, and 70G firewalls, offering AI-driven security, high performance, and energy efficiency for distributed organisations.

2 min. read
Placeholder for Pascal meier X Ml VD Tu E Hpg unsplashPascal meier X Ml VD Tu E Hpg unsplash

SD-WAN

Top SD-WAN solutions

Discover the top SD-WAN solutions and how they enhance performance, flexibility, and security. Make informed choices for your network.

9 min. read
Placeholder for Operational Technology (OT)Operational Technology (OT)

OT security

Trends and expectations for OT security in 2025

The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2025.

Lance Flowerree
Placeholder for Lance flowerreeLance flowerree

Lance Flowerree

10 min. read
Placeholder for Cybersecurity engineers looking at latest cybersecurity challengesCybersecurity engineers looking at latest cybersecurity challenges

Cybersecurity

The latest cybersecurity challenges

Explore the latest cybersecurity challenges, from AI-driven threats to quantum risks, impacting organisations in an evolving threat landscape.

Usman
Placeholder for UsmanUsman

Usman

9 min. read
Placeholder for Hetportretbureau HR T1 A2271Hetportretbureau HR T1 A2271
Juniper Networks

Juniper Networks Network management

Juniper introduces Secure AI-Native Edge solution for unified security and network management

Juniper's Secure AI-Native Edge solution integrates security and network management under Mist AI, enhancing operational efficiency, visibility, and protection.

2 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.