
SOC NOC
NOC vs SOC: The difference and why do you need both?
Discover the difference between an NOC and SOC, and why the collaboration between network management and cybersecurity is crucial for stable and secure IT environments.

Important Changes Mandated by PCI DSS 4 from March 2025
PCI DSS 4 brings 51 new mandatory requirements by March 2025. Understand the key changes and how they impact your compliance. Read more.

Bil Bragg

SOC
Artificial Intelligence at the Core of Nomiosā 24/7 Managed SOC
Nomios announces the integration of Qevlar AI's artificial intelligence within its 7 managed SOCs. Nomios also becomes a Qevlar AI integrator in Europe to enhance our clients' SOCs.

Romain Quinat

Scope is Fundamental to PCI DSS Compliance
Optimise your PCI DSS compliance by reducing scope. A well-planned scope review can lower compliance costs, minimise risk, and improve business agility.

Bil Bragg

Cyber attacks Cybersecurity
CyberWednesday: Top 10 Cybersecurity Updates #17
Recent events underline once again that cyber security is not a one-off action, but an ongoing process. Only through a proactive approach can adequate resilience to cyber threats be ensured.

Juniper Networks
Juniper Networks launches EX4000 Series for modern campus networks
Juniper's EX4000 Series delivers AI-Native, high-speed, and secure campus networking with Mist AI, Zero Trust, and Wi-Fi 7 readiness.

Fortinet NGFW
Fortinet introduces new FortiGate 30G, 50G, and 70G firewalls
Fortinet launches FortiGate 30G, 50G, and 70G firewalls, offering AI-driven security, high performance, and energy efficiency for distributed organisations.

Cloud security Cybersecurity
Cloud Security Evolution: A Practitionerās Journey
Cloud security is no longer just a practice but a strategic journey, requiring zero trust, automation, compliance focus, and proactive threat intelligence.

Ashley Pierre

OT security
Trends and expectations for OT security in 2025
The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2025.

Lance Flowerree

Cybersecurity
Cybersecurity in 2025: Top 10 Trends and Challenges
Cybersecurity 2025: AI threats, zero-days, supply chain risks, and human error demand smarter defences and robust strategies.

NGFW Firewall
Top 5 NGFW solutions for 2025
Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks become more sophisticated, NGFWs will continue to be essential components of any organisationās security solution, whether youāre in a data centre, network, or cloud.

Enrico Bottos

Cybersecurity
Top cybersecurity companies to watch in 2025
We selected the top cybersecurity companies to watch in 2025, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi

Cybersecurity
The latest cybersecurity challenges
Explore the latest cybersecurity challenges, from AI-driven threats to quantum risks, impacting organisations in an evolving threat landscape.

Usman Khan

Juniper Networks Netwerkbeheer
Juniper introduces Secure AI-Native Edge solution for unified security and network management
Juniper's Secure AI-Native Edge solution integrates security and network management under Mist AI, enhancing operational efficiency, visibility, and protection.

Company update
Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital
Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital

Network infrastructure Juniper Networks
When only the toughest will do: Discover Juniper's EX4100-H Switch
The Juniper Networks EX4100-H Ethernet Switch delivers robust, AI-enhanced connectivity and security for demanding environments, ensuring reliable performance in extreme conditions.

NIS2
Achieving NIS2 compliance in industrial companies
Thousands of industrial companies will be affected by the implementation of NIS2, with issues varying widely from one entity to another. We present you 12 steps to achieve compliance.

Arnaud Masson

Network segmentation Network security
Prevent lateral compromise with micro-segmentation
Why network micro-segmentation matters for network security and how it helps mitigate the spread of lateral compromise.

Herwig Mertens
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.