What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Manufacturing factory worker laptopManufacturing factory worker laptop

OT security Network security

Securing brownfield OT networks using a three-pronged approach

Discover how to secure brownfield OT networks with a practical, three-pronged strategy focused on visibility, legacy protection, and segmentation.

Lance Flowerree
Placeholder for Lance flowerreeLance flowerree

Lance Flowerree

3 min. read
Placeholder for Woman in coffee house laptopWoman in coffee house laptop
Nokia

Optical networking Nokia

10 key benefits of passive optical LAN for enterprise connectivity

Passive optical LAN has a lot of benefits for enterprise connectivity, speed and cost optimisation. Read the 10 benefits of passive optical LAN for enterprise connectivity.

Vincent de Knegt
Placeholder for Vincent de KnegtVincent de Knegt

Vincent de Knegt

7 min. read
Placeholder for Overloaded network teamOverloaded network team
Juniper Networks

Network management Mist AI

Overloaded network team? 3 signs that it's time for support

IT teams are often under pressure. No less than 85.8% of organisations are struggling with a shortage of qualified IT personnel. This staff shortage, combined with the increasing complexity of modern networks, is creating a workload that continues to grow.

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

6 min. read
Placeholder for Hospitality cybersecurity strategyHospitality cybersecurity strategy

Cybersecurity Hospitality

Protect your hotel and guests with a strong cybersecurity strategy

Hotels and accommodation providers process sensitive data on a daily basis and are an attractive target for cybercriminals. Discover how a strong cybersecurity strategy can protect your hotel and guests against data breaches, ransomware and other threats.

Marcel Hoogendoorn
Placeholder for Marcel HoogendoornMarcel Hoogendoorn

Marcel Hoogendoorn

3 min. read
Placeholder for Cyber security engineers smilingCyber security engineers smiling

SOC NOC

NOC vs SOC: The difference and why do you need both?

Discover the difference between an NOC and SOC, and why the collaboration between network management and cybersecurity is crucial for stable and secure IT environments.

3 min. read
Placeholder for Person walking on white floor tiles scopio 4b10bfbb dcf5 4e1d a1fe ed31771f934cPerson walking on white floor tiles scopio 4b10bfbb dcf5 4e1d a1fe ed31771f934c
Juniper Networks

Juniper Networks

Juniper Networks launches EX4000 Series for modern campus networks

Juniper's EX4000 Series delivers AI-Native, high-speed, and secure campus networking with Mist AI, Zero Trust, and Wi-Fi 7 readiness.

2 min. read
Placeholder for Datacenter hall blue lightDatacenter hall blue light
Fortinet

Fortinet NGFW

Fortinet introduces new FortiGate 30G, 50G, and 70G firewalls

Fortinet launches FortiGate 30G, 50G, and 70G firewalls, offering AI-driven security, high performance, and energy efficiency for distributed organisations.

2 min. read
Placeholder for Pascal meier X Ml VD Tu E Hpg unsplashPascal meier X Ml VD Tu E Hpg unsplash

SD-WAN

Top SD-WAN solutions

Discover the top SD-WAN solutions and how they enhance performance, flexibility, and security. Make informed choices for your network.

9 min. read
Placeholder for Operational Technology (OT)Operational Technology (OT)

OT security

Trends and expectations for OT security in 2025

The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2025.

Lance Flowerree
Placeholder for Lance flowerreeLance flowerree

Lance Flowerree

10 min. read
Placeholder for Text on a laptop screenText on a laptop screen

NGFW Firewall

Top 5 NGFW solutions for 2025

Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.

Enrico Bottos
Placeholder for Enrico BottosEnrico Bottos

Enrico Bottos

9 min. read
Placeholder for Cybersecurity companies 2025Cybersecurity companies 2025

Cybersecurity

Top cybersecurity companies to watch in 2025

We selected the top cybersecurity companies to watch in 2025, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi
Placeholder for Mohamed El HaddouchiMohamed El Haddouchi

Mohamed El Haddouchi

12 min. read
Placeholder for Cybersecurity engineers looking at latest cybersecurity challengesCybersecurity engineers looking at latest cybersecurity challenges

Cybersecurity

The latest cybersecurity challenges

Explore the latest cybersecurity challenges, from AI-driven threats to quantum risks, impacting organisations in an evolving threat landscape.

Usman Khan
Placeholder for Usman KhanUsman Khan

Usman Khan

9 min. read
Placeholder for Hetportretbureau HR T1 A2271Hetportretbureau HR T1 A2271
Juniper Networks

Juniper Networks Network management

Juniper introduces Secure AI-Native Edge solution for unified security and network management

Juniper's Secure AI-Native Edge solution integrates security and network management under Mist AI, enhancing operational efficiency, visibility, and protection.

2 min. read
Placeholder for OxfordOxford

Company update

Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital

Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital

4 min. read
Placeholder for Juniper Ex4100 HJuniper Ex4100 H
Juniper Networks

Network infrastructure Juniper Networks

When only the toughest will do: Discover Juniper's EX4100-H Switch

The Juniper Networks EX4100-H Ethernet Switch delivers robust, AI-enhanced connectivity and security for demanding environments, ensuring reliable performance in extreme conditions.

4 min. read
Placeholder for Industrial company NIS2Industrial company NIS2

NIS2

Achieving NIS2 compliance in industrial companies

Thousands of industrial companies will be affected by the implementation of NIS2, with issues varying widely from one entity to another. We present you 12 steps to achieve compliance.

Arnaud Masson
Placeholder for ARMARM

Arnaud Masson

4 min. read
Placeholder for Leave green macroLeave green macro

Network segmentation Network security

Prevent lateral compromise with micro-segmentation

Why network micro-segmentation matters for network security and how it helps mitigate the spread of lateral compromise.

Herwig Mertens
Placeholder for Herwig Mertens 2Herwig Mertens 2

Herwig Mertens

11 min. read
Placeholder for Hetportretbureau LR T1 A5719Hetportretbureau LR T1 A5719
Palo Alto Networks

SASE

The missing piece of SASE - Prisma Access Browser

Prisma Access Browser from Palo Alto Networks offers integrated security and control within SASE for every user on any device, with reduced costs and complexity.

Jan-Willem Sipman
Placeholder for Jan willem sipmanJan willem sipman

Jan-Willem Sipman

4 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.