What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Adobe Stock 598538570Adobe Stock 598538570

Identity

Nomios, Intragen and CyberArk: Identity Security as an Accelerator for Zero Trust

Identity Security as the Engine of Zero Trust: A ā€œMatch Made in Heavenā€ Between CyberArk and Palo Alto.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

5 min. read
Placeholder for Defend against machine-led attacksDefend against machine-led attacks
Nokia

Data centre Quantum Security

Quantum-safe networking design patterns for the data centre fabric and DCI

Practical guidance for applying multi-layer encryption, preparing the management plane for PQC, and building crypto-agility into your data centre fabric and DCI architecture.

Vincent de Knegt
Placeholder for Vincent de KnegtVincent de Knegt

Vincent de Knegt

5 min. read
Placeholder for Firefly Gemini Flash Bittergarnituur schaal met snacks kaas en kleine blauwe vlaggetjes in de snacks met 594841Firefly Gemini Flash Bittergarnituur schaal met snacks kaas en kleine blauwe vlaggetjes in de snacks met 594841
HPE

Mist AI

The bitterbal as proof that networks have become intelligent

What began as a lighthearted internal initiative evolved into a telling example of how modern network infrastructure can be more than connectivity alone.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Daily impact of PQC on cybersecurityDaily impact of PQC on cybersecurity

Quantum Security Cryptography

Post-quantum cryptography and its real-world impact on everyday security

Post-quantum cryptography is starting to affect everyday security. Learn where PQC changes TLS handshakes, messaging, email, certificates and identity, plus what this means for compatibility, performance and migration planning.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

5 min. read
Placeholder for Identity securityIdentity security

Identity management

Identity security in a changing IT landscape

For a long time, identity was the neglected part of IT security. User accounts, groups and permissions were necessary to keep systems running, but rarely the subject of strategic security decisions.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for I Stock 491561498I Stock 491561498

Zero-Trust Identity management

Why identity is the engine of zero trust

Identity is the engine of zero trust: learn how IAM, PAM and IGA enable continuous verification, reduce risk from privileged access, and strengthen identity hygiene across cloud and hybrid environments.

Mostafa Kamel
Placeholder for Mostafa kamelMostafa kamel

Mostafa Kamel

5 min. read
Placeholder for Practical NIS2 guidePractical NIS2 guide

NIS2

A practical NIS2 guide for network managers and IT directors

For network managers and IT directors, NIS2 does not significantly alter what is technically required, but it substantially raises the bar on what must be demonstrable.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

4 min. read
Placeholder for I love DDII love DDI
Infoblox

DDI

The silent weakness in higher education IT security

While universities and colleges are investing heavily in cloud, identity management and zero trust, a crucial part of the digital infrastructure remains conspicuously overlooked: DNS and DDI.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

2 min. read
Placeholder for Fortinet labFortinet lab

OT security

Passion as the quiet driver of OT security

Cybersecurity in industrial environments is rarely visible or dramatic. Yet a large part of the Dutch economy depends on it.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

2 min. read
Placeholder for Firefly Gemini Flash Large stage for a rock concert with a raving crowd and lights smoke and a large LED 443531Firefly Gemini Flash Large stage for a rock concert with a raving crowd and lights smoke and a large LED 443531

SASE

Not all SASE is created equal

If you look beyond marketing terms, you will see that SASE solutions differ fundamentally in design and approach.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for App cloakingApp cloaking

Cloaking

App Cloaking: the invisibility cloak for sensitive applications

I first came across the term app cloaking while colleagues of mine were working on a security solution for a large international law firm. The phrase stuck with me.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for PKI strategic pillarPKI strategic pillar

PKI

Why PKI is becoming a strategic pillar of modern cybersecurity

It often starts with something small. An application that suddenly becomes unavailable. An API integration that fails without a clear reason.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

4 min. read
Placeholder for HPE Discover 2025HPE Discover 2025

Enterprise networking HPE

HPE Discover Barcelona 2025: Insights from the show floor

Nomios was on site at HPE Discover Barcelona 2025, joining customers, partners and HPE leaders at one of the most influential events in the networking and infrastructure calendar.

2 min. read
Placeholder for Hetportretbureau HR T1 A0032 1Hetportretbureau HR T1 A0032 1

NGFW Firewall

Top 5 NGFW solutions for 2026

Explore the state of NGFW in 2026. Learn how leading next-generation firewall platforms support zero trust, hybrid cloud security, and risk reduction for modern enterprises.

Enrico Bottos
Placeholder for Enrico BottosEnrico Bottos

Enrico Bottos

7 min. read
Placeholder for Secure enterprise browserSecure enterprise browser
Palo Alto Networks

Browser

The browser as a strategic component of the security ecosystem

Over the past year, market momentum has clearly accelerated. Leading SASE and cybersecurity vendors are now explicitly positioning the browser as a core part of their platform strategies.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Back Box and Nomios network automationBack Box and Nomios network automation

Press release

BackBox and Nomios partner to help enterprises accelerate their network automation and cyber maturity journey

BackBox enables Nomios to integrate smoothly with various tools and multi-vendor devices for complete visibility in hybrid network environments.

2 min. read
Placeholder for Digital sovereignty - pkiDigital sovereignty - pki
Thales

Cryptography PKI

The plug and the key: A pragmatic view on digital sovereignty

Digital sovereignty has rapidly moved in Europe from an abstract policy concept to a concrete board-level topic. This has little to do with buzzwords and everything to do with geopolitics.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

5 min. read
Placeholder for Manny moreno Wxq7 U4ja Pf M unsplashManny moreno Wxq7 U4ja Pf M unsplash

Quantum Security

Crypto-Agility and the PQC Migration Handbook

The Dutch government's PQC migration handbook provides organisations with a structured approach to prepare for the arrival of post-quantum cryptography.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

2 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.