What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for EM Maturity ModelEM Maturity Model
Tenable

Exploring the Cyber Exposure Management maturity model

Exposure management is becoming a central theme for organisations that want to move beyond traditional vulnerability workflows. At Nomios, we see this shift every day.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Alex kotliarskyi our QHRTE2 IM unsplashAlex kotliarskyi our QHRTE2 IM unsplash

NIS2

Why governance is at the centre of the new NIST Cybersecurity Framework 2.0 and how it relates to NIS2

NIST has reshaped its Cybersecurity Framework for the first time in years, and the shift is hard to ignore.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Pexels pixabay 158826Pexels pixabay 158826
Palo Alto Networks

Palo Alto Networks Whitepaper

Rethinking the SOC for today’s threat landscape

Explore why organisations are moving away from traditional MSSP and SIEM models. The whitepaper shows how a Cortex-based SOC delivers clarity, speed, and better security outcomes.

1 min. read
Placeholder for HPE Aruba Central Next GenHPE Aruba Central Next Gen
HPE

HPE

Aruba Central goes next-gen and sets the stage for a new HPE–Juniper era

The new Aruba Central is now live, and it marks a clear shift in how HPE is positioning its cloud platforms for the years ahead.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Strata cloudStrata cloud
Palo Alto Networks

Palo Alto Networks

Why now is the time to migrate from Panorama to Strata Cloud Manager

With Strata Cloud Manager, Palo Alto Networks has introduced a cloud-native platform that brings management, automation, and visibility together. And now is the perfect time to make the move.

Richard Landman
Placeholder for Richard landman 1024x1024Richard landman 1024x1024

Richard Landman

3 min. read
Placeholder for Engineer working on network automationEngineer working on network automation

Network automation

Building trust in automation: why spreadsheets hold networks back

Discover why spreadsheets limit automation and how a trusted source of truth empowers modern network operations.

Adam Kirchberger
Placeholder for Adam KirchbergerAdam Kirchberger

Adam Kirchberger

2 min. read
Placeholder for Young engineer datacenter roomYoung engineer datacenter room

Network infrastructure

Why Wi-Fi site surveys matter more than ever

Reliable Wi-Fi has become essential in the modern workplace, not just a convenience. Poor coverage or unstable networks can disrupt productivity, collaboration, and critical services.

Giulio Quartero
Placeholder for Giulio QuarteroGiulio Quartero

Giulio Quartero

2 min. read
Placeholder for Engineers working on Managed PKIEngineers working on Managed PKI

Network security

PKI in practice: Use cases, challenges, and trade-offs

Explore PKI in practice: its use cases, challenges, trade-offs, and best practices for securing modern enterprise networks.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

3 min. read
Placeholder for LondonLondon

Nomios expands cybersecurity offering with the acquisition of Intragen, a European leader in IAM

Nomios acquires Intragen, a specialist in Identity and Access Management. The acquisition strengthens Nomios' position as a European leader in cybersecurity.

6 min. read
Placeholder for Managed SOC security engineer - MSSPManaged SOC security engineer - MSSP

Cyber attacks Ransomware

Modern ransomware: Obfuscation and fileless attacks explained

Discover advanced techniques used in modern ransomware: obfuscated code, fileless attacks and polymorphism. Protect your organisation with Nomios' modern SOC services.

Muhammed San
Placeholder for Muhammed SanMuhammed San

Muhammed San

4 min. read
Placeholder for Overloaded network teamOverloaded network team

Network management Mist AI

Overloaded network team? 3 signs that it's time for support

IT teams are often under pressure. No less than 85.8% of organisations are struggling with a shortage of qualified IT personnel. This staff shortage, combined with the increasing complexity of modern networks, is creating a workload that continues to grow.

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

7 min. read
Placeholder for IT supportIT support

Network management Network infrastructure

Future-proofing your network for security, efficiency, and growth

Future-proof your network with AI-driven solutions. Less downtime, more security and efficiency. Discover how simple modernisation can be!

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

5 min. read
Placeholder for Adobe Stock 902874337Adobe Stock 902874337

Mist AI

Dutch companies vulnerable due to outdated and complex networks

Dutch businesses are vulnerable to failures and cyber attacks due to outdated and complex networks. Recent incidents underline the urgency of modernising IT infrastructure.

7 min. read
Placeholder for TamperedChef malware fake PDF editorTamperedChef malware fake PDF editor

Malware Cybersecurity

TamperedChef malware hidden in fake PDF editor targets European organisations

TamperedChef hides in a fake PDF editor. Learn how it spreads, why it’s dangerous, and steps to detect and prevent infection.

Avinash Shet
Placeholder for Avinash shetAvinash shet

Avinash Shet

1 min. read
Placeholder for Defend against machine-led attacksDefend against machine-led attacks

Cybersecurity

Defending against machine-led attacks at every level

Learn how to defend against machine-led attacks with layered strategies across technology, policy, people, Zero-Trust, and resilience testing.

Usman
Placeholder for UsmanUsman

Usman

5 min. read
Placeholder for Offshore windmill parkOffshore windmill park

OT security

Why OT security is critical for energy and industrial operations

Protect OT systems in the oil and energy industry from ransomware, insider threats, and APTs with purpose-built cybersecurity for critical infrastructure.

Ahmed Mahmoud
Placeholder for Ahmed MahmoudAhmed Mahmoud

Ahmed Mahmoud

5 min. read
Placeholder for SASE alphabet soupSASE alphabet soup

SASE SSE

The alphabet soup of SASE: CASB vs. SWG, FWaaS, and more

Learn how SASE combines networking and cloud-delivered security tools like SWG, CASB, ZTNA, and FWaaS to protect users, apps, and data across your organisation.

5 min. read
Placeholder for Facade modern buildingFacade modern building
Palo Alto Networks

Palo Alto Networks

Palo Alto acquires CyberArk to strengthen identity security

Palo Alto acquires CyberArk to boost identity security. Learn how this helps secure human and machine identities in AI-driven enterprise environments.

1 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.