
SASE
FortiOS 8.0: Secure Networking in the AI Era
At Fortinet Accelerate 2026 in Las Vegas, Fortinet introduced FortiOS 8.0, the latest release of the operating system powering the Fortinet Security Fabric.

Michel Adelaar

NGFW
Security from Core to Edge: HPE Juniper Networks Introduces the SRX400 Series
One of the most concrete announcements is the HPE Juniper Networking SRX400 series: a compact next-generation firewall that brings carrier-grade security to the edge of the network.

Richard Landman

Digital Sovereignty
Digital Sovereignty That Works in Practice: Local Control, Global Resilience
Zscaler introduces the expansion of its digital sovereignty capabilities.

Richard Landman

Identity
Nomios, Intragen and CyberArk: Identity Security as an Accelerator for Zero Trust
Identity Security as the Engine of Zero Trust: A āMatch Made in Heavenā Between CyberArk and Palo Alto.

Richard Landman

Data centre Quantum Security
Quantum-safe networking design patterns for the data centre fabric and DCI
Practical guidance for applying multi-layer encryption, preparing the management plane for PQC, and building crypto-agility into your data centre fabric and DCI architecture.

Vincent de Knegt

Mist AI
The bitterbal as proof that networks have become intelligent
What began as a lighthearted internal initiative evolved into a telling example of how modern network infrastructure can be more than connectivity alone.

Richard Landman

Quantum Security Cryptography
Post-quantum cryptography and its real-world impact on everyday security
Post-quantum cryptography is starting to affect everyday security. Learn where PQC changes TLS handshakes, messaging, email, certificates and identity, plus what this means for compatibility, performance and migration planning.

Priyanka Gahilot

Identity management
Identity security in a changing IT landscape
For a long time, identity was the neglected part of IT security. User accounts, groups and permissions were necessary to keep systems running, but rarely the subject of strategic security decisions.

Richard Landman

Zero-Trust Identity management
Why identity is the engine of zero trust
Identity is the engine of zero trust: learn how IAM, PAM and IGA enable continuous verification, reduce risk from privileged access, and strengthen identity hygiene across cloud and hybrid environments.

Mostafa Kamel

NIS2
A practical NIS2 guide for network managers and IT directors
For network managers and IT directors, NIS2 does not significantly alter what is technically required, but it substantially raises the bar on what must be demonstrable.

Richard Landman

DDI
The silent weakness in higher education IT security
While universities and colleges are investing heavily in cloud, identity management and zero trust, a crucial part of the digital infrastructure remains conspicuously overlooked: DNS and DDI.

Richard Landman

OT security
Passion as the quiet driver of OT security
Cybersecurity in industrial environments is rarely visible or dramatic. Yet a large part of the Dutch economy depends on it.

Richard Landman

SASE
Not all SASE is created equal
If you look beyond marketing terms, you will see that SASE solutions differ fundamentally in design and approach.

Richard Landman

Cloaking
App Cloaking: the invisibility cloak for sensitive applications
I first came across the term app cloaking while colleagues of mine were working on a security solution for a large international law firm. The phrase stuck with me.

Richard Landman

PKI
Why PKI is becoming a strategic pillar of modern cybersecurity
It often starts with something small. An application that suddenly becomes unavailable. An API integration that fails without a clear reason.

Richard Landman
Enterprise networking HPE
HPE Discover Barcelona 2025: Insights from the show floor
Nomios was on site at HPE Discover Barcelona 2025, joining customers, partners and HPE leaders at one of the most influential events in the networking and infrastructure calendar.

NGFW Firewall
Top 5 NGFW solutions for 2026
Explore the state of NGFW in 2026. Learn how leading next-generation firewall platforms support zero trust, hybrid cloud security, and risk reduction for modern enterprises.

Enrico Bottos

Browser
The browser as a strategic component of the security ecosystem
Over the past year, market momentum has clearly accelerated. Leading SASE and cybersecurity vendors are now explicitly positioning the browser as a core part of their platform strategies.

Richard Landman
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

