
Exploring the Cyber Exposure Management maturity model
Exposure management is becoming a central theme for organisations that want to move beyond traditional vulnerability workflows. At Nomios, we see this shift every day.

Richard Landman

NIS2
Why governance is at the centre of the new NIST Cybersecurity Framework 2.0 and how it relates to NIS2
NIST has reshaped its Cybersecurity Framework for the first time in years, and the shift is hard to ignore.

Richard Landman

Palo Alto Networks Whitepaper
Rethinking the SOC for today’s threat landscape
Explore why organisations are moving away from traditional MSSP and SIEM models. The whitepaper shows how a Cortex-based SOC delivers clarity, speed, and better security outcomes.

HPE
Aruba Central goes next-gen and sets the stage for a new HPE–Juniper era
The new Aruba Central is now live, and it marks a clear shift in how HPE is positioning its cloud platforms for the years ahead.

Richard Landman

Palo Alto Networks
Why now is the time to migrate from Panorama to Strata Cloud Manager
With Strata Cloud Manager, Palo Alto Networks has introduced a cloud-native platform that brings management, automation, and visibility together. And now is the perfect time to make the move.

Richard Landman

Network automation
Building trust in automation: why spreadsheets hold networks back
Discover why spreadsheets limit automation and how a trusted source of truth empowers modern network operations.

Adam Kirchberger

Network infrastructure
Why Wi-Fi site surveys matter more than ever
Reliable Wi-Fi has become essential in the modern workplace, not just a convenience. Poor coverage or unstable networks can disrupt productivity, collaboration, and critical services.

Giulio Quartero

Network security
PKI in practice: Use cases, challenges, and trade-offs
Explore PKI in practice: its use cases, challenges, trade-offs, and best practices for securing modern enterprise networks.

Priyanka Gahilot

Nomios expands cybersecurity offering with the acquisition of Intragen, a European leader in IAM
Nomios acquires Intragen, a specialist in Identity and Access Management. The acquisition strengthens Nomios' position as a European leader in cybersecurity.

Cyber attacks Ransomware
Modern ransomware: Obfuscation and fileless attacks explained
Discover advanced techniques used in modern ransomware: obfuscated code, fileless attacks and polymorphism. Protect your organisation with Nomios' modern SOC services.

Muhammed San

Network management Mist AI
Overloaded network team? 3 signs that it's time for support
IT teams are often under pressure. No less than 85.8% of organisations are struggling with a shortage of qualified IT personnel. This staff shortage, combined with the increasing complexity of modern networks, is creating a workload that continues to grow.

Michel Adelaar

Network management Network infrastructure
Future-proofing your network for security, efficiency, and growth
Future-proof your network with AI-driven solutions. Less downtime, more security and efficiency. Discover how simple modernisation can be!

Michel Adelaar

Mist AI
Dutch companies vulnerable due to outdated and complex networks
Dutch businesses are vulnerable to failures and cyber attacks due to outdated and complex networks. Recent incidents underline the urgency of modernising IT infrastructure.

Malware Cybersecurity
TamperedChef malware hidden in fake PDF editor targets European organisations
TamperedChef hides in a fake PDF editor. Learn how it spreads, why it’s dangerous, and steps to detect and prevent infection.

Avinash Shet

Cybersecurity
Defending against machine-led attacks at every level
Learn how to defend against machine-led attacks with layered strategies across technology, policy, people, Zero-Trust, and resilience testing.

Usman

OT security
Why OT security is critical for energy and industrial operations
Protect OT systems in the oil and energy industry from ransomware, insider threats, and APTs with purpose-built cybersecurity for critical infrastructure.

Ahmed Mahmoud

SASE SSE
The alphabet soup of SASE: CASB vs. SWG, FWaaS, and more
Learn how SASE combines networking and cloud-delivered security tools like SWG, CASB, ZTNA, and FWaaS to protect users, apps, and data across your organisation.

Palo Alto Networks
Palo Alto acquires CyberArk to strengthen identity security
Palo Alto acquires CyberArk to boost identity security. Learn how this helps secure human and machine identities in AI-driven enterprise environments.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

