NIS2
NIS2 requires industrial companies to make major efforts to secure their OT environments: Where to start?
Thousands of industrial companies will be affected by the implementation of NIS2, with issues varying widely from one entity to another. We present you 12 steps to achieve compliance.
Arnaud Masson
Juniper Networks AI-driven enterprise
What is an AI-driven enterprise?
The growing maturity and availability of artificial intelligence (AI) enables the creation of an AI-driven enterprise. Read how Nomios and Juniper can help you build one.
Cloud security Endpoint security
The importance of Secure Web Gateway (SWG)
This article introduces Secure Web Gateways (SWG), covering key features, deployment options, scalability, organizational benefits, and integration.
Network automation
How automation centralises your tools and processes: A journey towards enhanced IT efficiency
Automation transforms IT roles, centralizing tools for efficiency, fostering innovation, and ushering in a new era of strategic growth in the sector.
SIEM
8 factors you should consider before implementing SIEM
Implementing a SIEM system involves key steps like defining objectives, ensuring compatibility, calculating costs, assessing skills, ensuring compliance, evaluating infrastructure, selecting a reliable vendor, and future-proofing for cybersecurity.
Juniper Networks HPE
HPE's strategic leap with Juniper Networks acquisition
Hewlett Packard Enterprise's (HPE) decision to acquire Juniper Networks for an estimated $14 billion is a testament to its strategic foresight in the evolving landscape of AI-driven networking.
Cybersecurity
Secure your future: Top cybersecurity trends for 2024
We’re on the brink of a new year again. Time to learn all about the most important and interesting cybersecurity trends for 2024.
Mohamed El Haddouchi
Email security
DMARC - From February 2024 your emails to gmail and yahoo could be rejected
By February 2024, Google and Yahoo will be imposing strict new rules on email security. Companies will be required to adopt DMARC authentication technology.
Romain Quinat
SOC NOC
NOC vs SOC: Unveiling differences and uniting strengths
NOC and SOC are essential in digital enterprises, combining network management with cybersecurity for resilient IT operations.
SD-WAN
Top 5 SD-WAN solutions for 2024
Discover the top SD-WAN solutions for 2024 and how they enhance performance, flexibility, and security. Make informed choices for your network.
SOC Cybersecurity
Navigating the 2024 cybersecurity landscape: Key trends in SOC security
A security operations centre (SOC) offers the security tools and knowledge that you need to keep your IT environment safe. Read all about the SOC security trends of 2024.
Avinash Shet
OT security
Trends and expectations for OT security in 2024
The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2024.
Rachid Groeneveld
Managed services Telco
Elevating operational technology security with managed PKI: A telco perspective
Managed PKI services simplify and secure digital identity and certificate management for telco operators transitioning to 5G.
NGFW Firewall
Top 5 NGFW solutions for 2024
Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks continue to become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.
Cybersecurity
Top cybersecurity companies to watch in 2024
We selected the top cybersecurity companies to watch in 2024, who have successfully differentiated themselves from other players in the market.
Mohamed El Haddouchi
SIEM
The benefits of outsourcing SIEM management
Explore the perks of SIEM outsourcing: scalability, expertise, cost savings, and continuous monitoring for superior cybersecurity.
Parm Dhillon
Data centre
Juniper Networks evolves datacenter security with distributed security services architecture
Juniper Networks introduces a scalable, AI-enhanced Distributed Security Services Architecture to modernize and secure distributed data center environments.
SASE SSE
The Alphabet Soup of SASE: CASB vs. SWG, FWaaS, and more
With a plethora of acronyms like SWG, CASB, and FWaaS filling the cybersecurity arena, it might seem like you've stumbled into a bowl of alphabet soup.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.