
Identity
Nomios, Intragen and CyberArk: Identity Security as an Accelerator for Zero Trust
Identity Security as the Engine of Zero Trust: A āMatch Made in Heavenā Between CyberArk and Palo Alto.

Richard Landman

Data centre Quantum Security
Quantum-safe networking design patterns for the data centre fabric and DCI
Practical guidance for applying multi-layer encryption, preparing the management plane for PQC, and building crypto-agility into your data centre fabric and DCI architecture.

Vincent de Knegt

Mist AI
The bitterbal as proof that networks have become intelligent
What began as a lighthearted internal initiative evolved into a telling example of how modern network infrastructure can be more than connectivity alone.

Richard Landman

Quantum Security Cryptography
Post-quantum cryptography and its real-world impact on everyday security
Post-quantum cryptography is starting to affect everyday security. Learn where PQC changes TLS handshakes, messaging, email, certificates and identity, plus what this means for compatibility, performance and migration planning.

Priyanka Gahilot

Identity management
Identity security in a changing IT landscape
For a long time, identity was the neglected part of IT security. User accounts, groups and permissions were necessary to keep systems running, but rarely the subject of strategic security decisions.

Richard Landman

Zero-Trust Identity management
Why identity is the engine of zero trust
Identity is the engine of zero trust: learn how IAM, PAM and IGA enable continuous verification, reduce risk from privileged access, and strengthen identity hygiene across cloud and hybrid environments.

Mostafa Kamel

NIS2
A practical NIS2 guide for network managers and IT directors
For network managers and IT directors, NIS2 does not significantly alter what is technically required, but it substantially raises the bar on what must be demonstrable.

Richard Landman

DDI
The silent weakness in higher education IT security
While universities and colleges are investing heavily in cloud, identity management and zero trust, a crucial part of the digital infrastructure remains conspicuously overlooked: DNS and DDI.

Richard Landman

OT security
Passion as the quiet driver of OT security
Cybersecurity in industrial environments is rarely visible or dramatic. Yet a large part of the Dutch economy depends on it.

Richard Landman

SASE
Not all SASE is created equal
If you look beyond marketing terms, you will see that SASE solutions differ fundamentally in design and approach.

Richard Landman

Cloaking
App Cloaking: the invisibility cloak for sensitive applications
I first came across the term app cloaking while colleagues of mine were working on a security solution for a large international law firm. The phrase stuck with me.

Richard Landman

PKI
Why PKI is becoming a strategic pillar of modern cybersecurity
It often starts with something small. An application that suddenly becomes unavailable. An API integration that fails without a clear reason.

Richard Landman
Enterprise networking HPE
HPE Discover Barcelona 2025: Insights from the show floor
Nomios was on site at HPE Discover Barcelona 2025, joining customers, partners and HPE leaders at one of the most influential events in the networking and infrastructure calendar.

NGFW Firewall
Top 5 NGFW solutions for 2026
Explore the state of NGFW in 2026. Learn how leading next-generation firewall platforms support zero trust, hybrid cloud security, and risk reduction for modern enterprises.

Enrico Bottos

Browser
The browser as a strategic component of the security ecosystem
Over the past year, market momentum has clearly accelerated. Leading SASE and cybersecurity vendors are now explicitly positioning the browser as a core part of their platform strategies.

Richard Landman

Press release
BackBox and Nomios partner to help enterprises accelerate their network automation and cyber maturity journey
BackBox enables Nomios to integrate smoothly with various tools and multi-vendor devices for complete visibility in hybrid network environments.

Cryptography PKI
The plug and the key: A pragmatic view on digital sovereignty
Digital sovereignty has rapidly moved in Europe from an abstract policy concept to a concrete board-level topic. This has little to do with buzzwords and everything to do with geopolitics.

Richard Landman

Quantum Security
Crypto-Agility and the PQC Migration Handbook
The Dutch government's PQC migration handbook provides organisations with a structured approach to prepare for the arrival of post-quantum cryptography.

Richard Landman
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

