What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Cyberdefence security engineersCyberdefence security engineers

MDR

Why MDR services are essential to modern cybersecurity efforts

Want to counter cybersecurity threats, have an intel agency at your disposal, and do all of this at a predictable cost? Then MDR security services are the solution for you.

Erik Biemans
Placeholder for Erik BiemansErik Biemans

Erik Biemans

7 min. read
Placeholder for Rainbow housesRainbow houses

API security

API security, are you prepared?

The use of APIs has evolved in recent years, especially through smartphone use, making API security essential.

Matthieu Millot
Placeholder for Matthieu MilotMatthieu Milot

Matthieu Millot

4 min. read
Placeholder for Male and female engineer discussionMale and female engineer discussion

Network automation

Wi-Fi networks and the rise of AI

Wi-Fi has been undergoing major changes recently, partly due to working from home. We compare 4 major Wi-Fi vendors and the use of AI.

Jérôme Wezelenburg
Placeholder for Jerome WezelenburgJerome Wezelenburg

Jérôme Wezelenburg

3 min. read
Placeholder for Cloud architect high level designCloud architect high level design

SIEM EDR

How SIEM, EDR and NDR complement each other

We will take a closer look at SIEM, EDR and NDR and show you how the three solutions have the potential to effectively complement each other.

3 min. read
Placeholder for Shark threatShark threat

Cyber attacks Cloud security

Top cybersecurity threats to be aware of

Cybersecurity threats are part of everyday life, such as attacks on IoT, phishing scams and ransomware attacks. Make sure your business is safe from these threats.

6 min. read
Placeholder for Retail shopper bags smartphoneRetail shopper bags smartphone

Zero-Trust

The password problem

What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.

Rachid Groeneveld
Placeholder for Rachid GroeneveldRachid Groeneveld

Rachid Groeneveld

8 min. read
Placeholder for Engineers manufacturingEngineers manufacturing

OT security

Top five OT security threats

These OT security threats provide an overview of critical and most common cyber threats to Operational Technology.

9 min. read
Placeholder for Problem managementProblem management

Problem management ITIL

Problem management: tools cannot give you wisdom

As long as there are no tools that think for us, problem management will largely be a human activity, where the combination of technical skills and soft skills is greater than ever.

Tom Jansen
Placeholder for Tom JansenTom Jansen

Tom Jansen

4 min. read
Placeholder for Two network engineers datacenterTwo network engineers datacenter

Mist AI Enterprise networking

Back to the office with a strong Wi-Fi connection

With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?

Jérôme Wezelenburg
Placeholder for Jerome WezelenburgJerome Wezelenburg

Jérôme Wezelenburg

3 min. read
Placeholder for Hetportretbureau LR T1 A5975Hetportretbureau LR T1 A5975

ITIL

Why ITIL can be applied at any level

Many organisations struggle with a proper ITIL implementation. But this best practice offers a range of solutions that can partly be implemented at one's own discretion.

Tom Jansen
Placeholder for Tom JansenTom Jansen

Tom Jansen

3 min. read
Placeholder for Explaining the importance of Zero TrustExplaining the importance of Zero Trust

Zero-Trust Palo Alto Networks

Why Zero Trust is essential in a post-pandemic world

The rapid transformation to hybrid work and hybrid networks/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world.

Kumar Ramachandran from Palo Alto
Placeholder for Kumar RamachandranKumar Ramachandran

Kumar Ramachandran from Palo Alto

5 min. read
Placeholder for Manufacturing employees factory laptopManufacturing employees factory laptop

OT security Fortinet

Global OT and cybersecurity report outlines key challenges for industrial organisations

Fortinet released the 2022 State of Operational Technology and Cybersecurity Report. The global report highlights the current state of OT security and provides a roadmap to better secure OT organisations.

4 min. read
Placeholder for Aerial view ship portAerial view ship port

Cisco Firewall

SecureX and Secure Firewall: Integration and automation to simplify security

New integrations between SecureX and Secure Firewall streamline processes and increase automation to simplify your security.

Aditya Sankar from Cisco
Placeholder for Aditya SankarAditya Sankar

Aditya Sankar from Cisco

4 min. read
Placeholder for Hetportretbureau LR T1 A5873Hetportretbureau LR T1 A5873

SASE Juniper Networks

Simplifying the SASE experience with Juniper Networks

With the addition of Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP), Juniper Secure Edge now provides full-stack SSE capabilities, simplifying the SASE experience for customers.

Samantha Madrid from Juniper Networks
Placeholder for Female5Female5

Samantha Madrid from Juniper Networks

5 min. read
Placeholder for Cybersecurity engineer datacenterCybersecurity engineer datacenter

Trellix XDR

Cyber readiness & XDR: Progress, challenges & opportunities

Trellix pays particularly close attention to how EDR and XDR are being implemented across the public and private sectors.

7 min. read
Placeholder for Office network engineersOffice network engineers

WAF F5 Networks

WAF technology needs to adapt now that apps are increasingly distributed

As workload deployments expand across diverse environments and app architectures, organisations want to be able to enforce consistent security controls across all applications, anywhere.

Frank Kyei-Manu from F5
Placeholder for Frank kyei manuFrank kyei manu

Frank Kyei-Manu from F5

4 min. read
Placeholder for Security engineer glasses closeupSecurity engineer glasses closeup

Zero-Trust ZTNA

ZTNA 1.0 vs ZTNA 2.0

ZTNA 2.0 provides a new era of secure access. It solves trust problems by removing implicit trust to help ensure organisations are properly secured.

4 min. read
Placeholder for The Nomios telco team in MoroccoThe Nomios telco team in Morocco

CSR

A tree for every optic: how Nomios commits to reforestation

Nomios has planted 5000 trees in Morocco's Rif region in line with its CSR and reforestation commitments.

Jan-Willem Sipman
Placeholder for Jan Willem SipmanJan Willem Sipman

Jan-Willem Sipman

3 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.