
Network infrastructure
Why Wi-Fi site surveys matter more than ever
Reliable Wi-Fi has become essential in the modern workplace, not just a convenience. Poor coverage or unstable networks can disrupt productivity, collaboration, and critical services.

Giulio Quartero

Network security
PKI in practice: Use cases, challenges, and trade-offs
Explore PKI in practice: its use cases, challenges, trade-offs, and best practices for securing modern enterprise networks.

Priyanka Gahilot

Nomios expands cybersecurity offering with the acquisition of Intragen, a European leader in IAM
Nomios acquires Intragen, a specialist in Identity and Access Management. The acquisition strengthens Nomios' position as a European leader in cybersecurity.

Network management Mist AI
Overloaded network team? 3 signs that it's time for support
IT teams are often under pressure. No less than 85.8% of organisations are struggling with a shortage of qualified IT personnel. This staff shortage, combined with the increasing complexity of modern networks, is creating a workload that continues to grow.

Michel Adelaar

Network management Network infrastructure
Future-proofing your network for security, efficiency, and growth
Future-proof your network with AI-driven solutions. Less downtime, more security and efficiency. Discover how simple modernisation can be!

Michel Adelaar

Malware Cybersecurity
TamperedChef malware hidden in fake PDF editor targets European organisations
TamperedChef hides in a fake PDF editor. Learn how it spreads, why it’s dangerous, and steps to detect and prevent infection.

Avinash Shet

Cybersecurity
Defending against machine-led attacks at every level
Learn how to defend against machine-led attacks with layered strategies across technology, policy, people, Zero-Trust, and resilience testing.

Usman

OT security
Why OT security is critical for energy and industrial operations
Protect OT systems in the oil and energy industry from ransomware, insider threats, and APTs with purpose-built cybersecurity for critical infrastructure.

Ahmed Mahmoud

SASE SSE
The alphabet soup of SASE: CASB vs. SWG, FWaaS, and more
Learn how SASE combines networking and cloud-delivered security tools like SWG, CASB, ZTNA, and FWaaS to protect users, apps, and data across your organisation.

Palo Alto Networks
Palo Alto acquires CyberArk to strengthen identity security
Palo Alto acquires CyberArk to boost identity security. Learn how this helps secure human and machine identities in AI-driven enterprise environments.

Support Fortinet
Fortinet ETSP Partner Programme: Why Expert Certification Matters for Your Security?
Discover why Fortinet ETSP Partners like Nomios deliver superior security outcomes. As one of only three UK ETSP-certified integrators, our Fortinet Certified Engineers ensure expert implementation and support.

Cyber attacks
Modern Ransomware: Obfuscated Code and Fileless Attacks
Discover advanced techniques used in modern ransomware: obfuscated code, fileless attacks and polymorphism. Protect your organisation with Nomios' modern SOC services.

Romain Quinat

Cybersecurity
Traditional vs. Machine-led attack chains
A side-by-side comparison of the traditional cyber kill chain and the new machine-led attack chain, highlighting key differences and the implications for modern cybersecurity defences.

Usman

SOC
Scattered Spider: Visualising the initial attack
Explore how Scattered Spider gains initial access - visualise their attack flow and learn ways to disrupt their tactics.

Ben Catten

HPE Juniper Networks
HPE completes acquisition of Juniper Networks
HPE has completed its $14 billion acquisition of Juniper Networks, reshaping the enterprise networking landscape with a strong focus on AI-driven, cloud-managed infrastructure.

Enterprise networking
Gartner MQ 2025: Juniper, Fortinet and HPE take the lead in enterprise networking
Discover why Juniper, Fortinet and HPE lead the 2025 Gartner Magic Quadrant for Enterprise LAN. Explore their unique strengths — and how Nomios helps enterprises design, deploy and secure future-ready networks.

OT security Network security
Securing brownfield OT networks using a three-pronged approach
Discover how to secure brownfield OT networks with a practical, three-pronged strategy focused on visibility, legacy protection, and segmentation.

Lance Flowerree

Optical networking Nokia
10 key benefits of passive optical LAN for enterprise connectivity
Passive optical LAN has a lot of benefits for enterprise connectivity, speed and cost optimisation. Read the 10 benefits of passive optical LAN for enterprise connectivity.

Vincent de Knegt
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

