Nomios Group expands in Southern Europe with leading Italian cybersecurity expert Aditinet Read article

Resources

An overview of security and networking definitions, cybersecurity concepts explained and more resources.

Placeholder for Futuristic microchipFuturistic microchip

What is Quantum Security?

Quantum security is a developing field with the potential to transform cybersecurity, but it's not yet fully available. However, the threat to current cryptographic systems by quantum computers is already a reality.

Placeholder for Shadow ITShadow IT

Was ist Shadow IT und wie kann man sich davor schützen?

Shadow IT stands for systems, apps/applications or cloud services that employees of a company use without the knowledge or consent of the IT department.

Placeholder for Microsoft Teams image 14Microsoft Teams image 14

The Four Horsemen of Automation

The last few years have seen an acceleration in digital transformation; in part because of the pandemic and the necessity to provide remote access to corporate systems, data and applications, but also driven by demand from employees and customers for digital solutions.

Placeholder for Waterways aquaductWaterways aquaduct

What is NIS2 and what does it mean for your organisation?

To improve cybersecurity in Europe, the EU is coming up with a new directive: the NIS2. Read what this directive entails and what it means for your organisation.

Placeholder for Disaggregated networkDisaggregated network

What is a disaggregated network?

Network disaggregation allows for a completely different way of networking. At its most basic, disaggregation is the separation of hardware and software.

Placeholder for Cybersecurity network security engineerCybersecurity network security engineer

What is vulnerability management?

Vulnerability Management is a proactive strategy to identify, prioritise and correct security weaknesses and vulnerabilities in an organisation.

Placeholder for Cloud architect developerCloud architect developer

What is Zero Touch Provisioning (ZTP)?

Zero Touch Provisioning (ZTP) installs or updates the software on your new devices without you having to do anything.

Placeholder for Security experts for MDR servicesSecurity experts for MDR services

What is a NOC?

A Network Operations Centre (NOC) is a centralised place where information technology teams can monitor the performance and health of a network on a continuous basis. The NOC is the very first line of protection against network disturbances and outages.

Placeholder for Passive optical LANPassive optical LAN

What is passive optical LAN?

Passive Optical LAN speeds up your local network and simultaneously brings down maintenance and hardware costs.

Placeholder for Aerial view new york streetsAerial view new york streets

What is DDI?

DDI is a combination of DNS, DHCP and IPAM. It describes the integration of these three core components of networking into one management solution.

Placeholder for Security engineer desktopSecurity engineer desktop

What is a SOC?

SOC is the abbreviation for Security Operations Center. The SOC security team uses a combination of technology solutions and a strong set of processes.

Placeholder for Woman in city checking directions mapsWoman in city checking directions maps

What is EDR?

Endpoint Detection and Response (EDR) is an integrated endpoint security solution that combines real-time monitoring and the collection of endpoint data with rule-based automated response and analysis capabilities.

Placeholder for Cybersecurity engineer coffee breakCybersecurity engineer coffee break

Whitepaper: Understand the basics of cybersecurity

By understanding the basics of cybersecurity you will be comfortable in a security conversation. Get your 70+ pages to learn more about cybersecurity.

Placeholder for Cyberdefence security engineersCyberdefence security engineers

What is cyberdefence

Cyberdefence is the ability to prevent cyberattacks from infecting a network, computer system or device. It involves taking active steps and responding to intrusions, all while preventing them as much as possible.

Placeholder for Managed SOC security engineer - MSSPManaged SOC security engineer - MSSP

What is a managed SOC?

Every organisation wants to be protected against cyber attacks. Protection against cyber attacks gets harder every day, as the attacks become more complex, are ever-evolving, and are increasing in numbers.

Placeholder for Engineer focused behind laptopEngineer focused behind laptop

What is Kaseya ransomware?

On July 2nd 2021 a massive supply-chain ransomware attack on the software company Kaseya took place. The group REvil was behind this attack.

Placeholder for Office building by nightOffice building by night

What is the SOC visibility triad?

The SOC visibility triad provides a multi-layered and network-centric security approach with SIEM, NDR and EDR. Find out what it is and how it works.

Placeholder for Network services IPAM and DNSNetwork services IPAM and DNS

ZTNA - What is it and why do you want it?

ZTNA stands for Zero Trust Network Access. It ensures that you give secure access to private applications without giving the user access to the enterprise network.