Registration for Nomios Next is now live! Sign up for the cybersecurity event of 2026. More info

What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Screenshot 2026 01 07 at 11 56 49 am pngScreenshot 2026 01 07 at 11 56 49 am png
Palo Alto Networks

XDR

Palo Alto Networks launches Cortex XDR 5.0: ready for the next step in security operations?

Attackers are moving faster than ever. The time between initial access and full compromise has shrunk to minutes — and more than 90% of all breaches can be traced back to preventable gaps.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Firefly Gemini Flash 1Firefly Gemini Flash 1
Vectra AI

MDR Assume Breach

Assume breach in practice: what it really demands of your security team

The NCSC recently published a practical guide for security professionals: Convince your board of assume breach.

Bas de Mooij
Placeholder for Bas de MooijBas de Mooij

Bas de Mooij

2 min. read
Placeholder for Hetportretbureau HR T1 A0887Hetportretbureau HR T1 A0887
Infoblox

DDI

Nomios achieves Infoblox's highest partner status — as the only European integrator

Nomios Group has achieved Diamond partner status with Infoblox, the highest tier within the Infoblox partner network.

2 min. read
Placeholder for Palo alto networks cortex xdrPalo alto networks cortex xdr
Palo Alto Networks

SIEM MDR

Cortex XDR as SIEM light: powerful detection and compliance without the complexity

Many organisations face the same dilemma: they know they need better visibility into what is happening across their environment, but a full SIEM platform feels like a significant undertaking — expensive, complex to manage, and heavy to implement.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Quantum Safe NetworkingQuantum Safe Networking
Nokia

Quantum Security Network security

Why quantum-safe networking needs to be on your 2026 agenda

Find out why quantum-safe networking should be on every IT leader's 2026 agenda and what practical steps to take now on encryption, key governance, and post-quantum cryptography readiness.

Vincent de Knegt
Placeholder for Vincent de KnegtVincent de Knegt

Vincent de Knegt

4 min. read
Placeholder for Data layer modern soc cybersecurityData layer modern soc cybersecurity
Palo Alto Networks

SOC

The data layer as the foundation of the modern SOC

Anyone building or modernising a Security Operations Centre will eventually reach the same conclusion: the quality of the data layer determines the quality of everything built on top of it.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

4 min. read
Placeholder for Accelerate25 blog heroAccelerate25 blog hero
Fortinet

SASE

FortiOS 8.0: Secure Networking in the AI Era

At Fortinet Accelerate 2026 in Las Vegas, Fortinet introduced FortiOS 8.0, the latest release of the operating system powering the Fortinet Security Fabric.

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

2 min. read
Placeholder for HPE Juniper SRX400HPE Juniper SRX400
HPE

NGFW

Security from Core to Edge: HPE Juniper Networks Introduces the SRX400 Series

One of the most concrete announcements is the HPE Juniper Networking SRX400 series: a compact next-generation firewall that brings carrier-grade security to the edge of the network.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Adobe Stock 94576008Adobe Stock 94576008
Zscaler

Digital Sovereignty

Digital Sovereignty That Works in Practice: Local Control, Global Resilience

Zscaler introduces the expansion of its digital sovereignty capabilities.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

5 min. read
Placeholder for Adobe Stock 598538570Adobe Stock 598538570

Identity

Nomios, Intragen and CyberArk: Identity Security as an Accelerator for Zero Trust

Identity Security as the Engine of Zero Trust: A ā€œMatch Made in Heavenā€ Between CyberArk and Palo Alto.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

5 min. read
Placeholder for Defend against machine-led attacksDefend against machine-led attacks
Nokia

Data centre Quantum Security

Quantum-safe networking design patterns for the data centre fabric and DCI

Practical guidance for applying multi-layer encryption, preparing the management plane for PQC, and building crypto-agility into your data centre fabric and DCI architecture.

Vincent de Knegt
Placeholder for Vincent de KnegtVincent de Knegt

Vincent de Knegt

5 min. read
Placeholder for Firefly Gemini Flash Bittergarnituur schaal met snacks kaas en kleine blauwe vlaggetjes in de snacks met 594841Firefly Gemini Flash Bittergarnituur schaal met snacks kaas en kleine blauwe vlaggetjes in de snacks met 594841
HPE

Mist AI

The bitterbal as proof that networks have become intelligent

What began as a lighthearted internal initiative evolved into a telling example of how modern network infrastructure can be more than connectivity alone.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Daily impact of PQC on cybersecurityDaily impact of PQC on cybersecurity

Quantum Security Cryptography

Post-quantum cryptography and its real-world impact on everyday security

Post-quantum cryptography is starting to affect everyday security. Learn where PQC changes TLS handshakes, messaging, email, certificates and identity, plus what this means for compatibility, performance and migration planning.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

5 min. read
Placeholder for Identity securityIdentity security

Identity management

Identity security in a changing IT landscape

For a long time, identity was the neglected part of IT security. User accounts, groups and permissions were necessary to keep systems running, but rarely the subject of strategic security decisions.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for I Stock 491561498I Stock 491561498

Zero-Trust Identity management

Why identity is the engine of zero trust

Identity is the engine of zero trust: learn how IAM, PAM and IGA enable continuous verification, reduce risk from privileged access, and strengthen identity hygiene across cloud and hybrid environments.

Mostafa Kamel
Placeholder for Mostafa kamelMostafa kamel

Mostafa Kamel

5 min. read
Placeholder for Practical NIS2 guidePractical NIS2 guide

NIS2

A practical NIS2 guide for network managers and IT directors

For network managers and IT directors, NIS2 does not significantly alter what is technically required, but it substantially raises the bar on what must be demonstrable.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

4 min. read
Placeholder for I love DDII love DDI
Infoblox

DDI

The silent weakness in higher education IT security

While universities and colleges are investing heavily in cloud, identity management and zero trust, a crucial part of the digital infrastructure remains conspicuously overlooked: DNS and DDI.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

2 min. read
Placeholder for Fortinet labFortinet lab

OT security

Passion as the quiet driver of OT security

Cybersecurity in industrial environments is rarely visible or dramatic. Yet a large part of the Dutch economy depends on it.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

2 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.