What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Young engineer datacenter roomYoung engineer datacenter room

Network infrastructure

Why Wi-Fi site surveys matter more than ever

Reliable Wi-Fi has become essential in the modern workplace, not just a convenience. Poor coverage or unstable networks can disrupt productivity, collaboration, and critical services.

Giulio Quartero
Placeholder for Giulio QuarteroGiulio Quartero

Giulio Quartero

2 min. read
Placeholder for Engineers working on Managed PKIEngineers working on Managed PKI

Network security

PKI in practice: Use cases, challenges, and trade-offs

Explore PKI in practice: its use cases, challenges, trade-offs, and best practices for securing modern enterprise networks.

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot

3 min. read
Placeholder for LondonLondon

Nomios expands cybersecurity offering with the acquisition of Intragen, a European leader in IAM

Nomios acquires Intragen, a specialist in Identity and Access Management. The acquisition strengthens Nomios' position as a European leader in cybersecurity.

6 min. read
Placeholder for Overloaded network teamOverloaded network team
Juniper Networks

Network management Mist AI

Overloaded network team? 3 signs that it's time for support

IT teams are often under pressure. No less than 85.8% of organisations are struggling with a shortage of qualified IT personnel. This staff shortage, combined with the increasing complexity of modern networks, is creating a workload that continues to grow.

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

7 min. read
Placeholder for IT supportIT support
Juniper Networks

Network management Network infrastructure

Future-proofing your network for security, efficiency, and growth

Future-proof your network with AI-driven solutions. Less downtime, more security and efficiency. Discover how simple modernisation can be!

Michel Adelaar
Placeholder for Michel AdelaarMichel Adelaar

Michel Adelaar

5 min. read
Placeholder for TamperedChef malware fake PDF editorTamperedChef malware fake PDF editor

Malware Cybersecurity

TamperedChef malware hidden in fake PDF editor targets European organisations

TamperedChef hides in a fake PDF editor. Learn how it spreads, why it’s dangerous, and steps to detect and prevent infection.

Avinash Shet
Placeholder for Avinash shetAvinash shet

Avinash Shet

1 min. read
Placeholder for Defend against machine-led attacksDefend against machine-led attacks

Cybersecurity

Defending against machine-led attacks at every level

Learn how to defend against machine-led attacks with layered strategies across technology, policy, people, Zero-Trust, and resilience testing.

Usman
Placeholder for UsmanUsman

Usman

5 min. read
Placeholder for Offshore windmill parkOffshore windmill park

OT security

Why OT security is critical for energy and industrial operations

Protect OT systems in the oil and energy industry from ransomware, insider threats, and APTs with purpose-built cybersecurity for critical infrastructure.

Ahmed Mahmoud
Placeholder for Ahmed MahmoudAhmed Mahmoud

Ahmed Mahmoud

5 min. read
Placeholder for SASE alphabet soupSASE alphabet soup

SASE SSE

The alphabet soup of SASE: CASB vs. SWG, FWaaS, and more

Learn how SASE combines networking and cloud-delivered security tools like SWG, CASB, ZTNA, and FWaaS to protect users, apps, and data across your organisation.

5 min. read
Placeholder for Facade modern buildingFacade modern building
Palo Alto Networks

Palo Alto Networks

Palo Alto acquires CyberArk to strengthen identity security

Palo Alto acquires CyberArk to boost identity security. Learn how this helps secure human and machine identities in AI-driven enterprise environments.

1 min. read
Placeholder for Engineer focused behind laptopEngineer focused behind laptop
Fortinet

Support Fortinet

Fortinet ETSP Partner Programme: Why Expert Certification Matters for Your Security?

Discover why Fortinet ETSP Partners like Nomios deliver superior security outcomes. As one of only three UK ETSP-certified integrators, our Fortinet Certified Engineers ensure expert implementation and support.

3 min. read
Placeholder for Cybersecurity engineer female desktop computerCybersecurity engineer female desktop computer

Cyber attacks

Modern Ransomware: Obfuscated Code and Fileless Attacks

Discover advanced techniques used in modern ransomware: obfuscated code, fileless attacks and polymorphism. Protect your organisation with Nomios' modern SOC services.

Romain Quinat
Placeholder for Romain QuinatRomain Quinat

Romain Quinat

5 min. read
Placeholder for Traditional vs. machine-led attack chainsTraditional vs. machine-led attack chains

Cybersecurity

Traditional vs. Machine-led attack chains

A side-by-side comparison of the traditional cyber kill chain and the new machine-led attack chain, highlighting key differences and the implications for modern cybersecurity defences.

Usman
Placeholder for UsmanUsman

Usman

6 min. read
Placeholder for Security engineer glasses closeupSecurity engineer glasses closeup

SOC

Scattered Spider: Visualising the initial attack

Explore how Scattered Spider gains initial access - visualise their attack flow and learn ways to disrupt their tactics.

Ben Catten
Placeholder for Nomios BCNomios BC

Ben Catten

3 min. read
Placeholder for Adobe Stock 88542959Adobe Stock 88542959
Juniper Networks

HPE Juniper Networks

HPE completes acquisition of Juniper Networks

HPE has completed its $14 billion acquisition of Juniper Networks, reshaping the enterprise networking landscape with a strong focus on AI-driven, cloud-managed infrastructure.

3 min. read
Placeholder for Man sitting behind screen thinkingMan sitting behind screen thinking

Enterprise networking

Gartner MQ 2025: Juniper, Fortinet and HPE take the lead in enterprise networking

Discover why Juniper, Fortinet and HPE lead the 2025 Gartner Magic Quadrant for Enterprise LAN. Explore their unique strengths — and how Nomios helps enterprises design, deploy and secure future-ready networks.

4 min. read
Placeholder for Manufacturing factory worker laptopManufacturing factory worker laptop

OT security Network security

Securing brownfield OT networks using a three-pronged approach

Discover how to secure brownfield OT networks with a practical, three-pronged strategy focused on visibility, legacy protection, and segmentation.

Lance Flowerree
Placeholder for Lance flowerreeLance flowerree

Lance Flowerree

3 min. read
Placeholder for Woman in coffee house laptopWoman in coffee house laptop
Nokia

Optical networking Nokia

10 key benefits of passive optical LAN for enterprise connectivity

Passive optical LAN has a lot of benefits for enterprise connectivity, speed and cost optimisation. Read the 10 benefits of passive optical LAN for enterprise connectivity.

Vincent de Knegt
Placeholder for Vincent de KnegtVincent de Knegt

Vincent de Knegt

7 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.