
SOC NOC
NOC vs SOC: The difference and why do you need both?
Discover the difference between an NOC and SOC, and why the collaboration between network management and cybersecurity is crucial for stable and secure IT environments.

Cyber attacks Cybersecurity
CyberWednesday: Top 10 Cybersecurity Updates #17
Recent events underline once again that cyber security is not a one-off action, but an ongoing process. Only through a proactive approach can adequate resilience to cyber threats be ensured.

Juniper Networks
Juniper Networks launches EX4000 Series for modern campus networks
Juniper's EX4000 Series delivers AI-Native, high-speed, and secure campus networking with Mist AI, Zero Trust, and Wi-Fi 7 readiness.

Fortinet NGFW
Fortinet introduces new FortiGate 30G, 50G, and 70G firewalls
Fortinet launches FortiGate 30G, 50G, and 70G firewalls, offering AI-driven security, high performance, and energy efficiency for distributed organisations.

Sensibilisation
Reducing IT costs - how to organise the total costs of ownership of your IT infrastructure more efficiently.
Ob on-Prem oder cloudbasiert – die eigene IT-Infrastruktur ist ein signifikanter Kostenblock eines jeden Unternehmens. Wir zeigen, wie Sie Ihre IT-Kosten senken, ohne bei der Ergebnisqualität einzubüßen.

Philippe Strübbe

VPN
Cybersecurity in the Age of Remote Work: Best Practices

Ercan Acar

Award Managed services
Nomios receives German Excellence Award for managed service approach
Nomios Germany wurde für seinen innovativen Ansatz im Bereich Managed Services mit dem Deutschen Excellence Award ausgezeichnet.

OT security
Trends and expectations for OT security in 2025
The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2025.

Lance Flowerree

NGFW Firewall
Top 5 NGFW solutions for 2025
Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.

Enrico Bottos

Cybersecurity
Top cybersecurity companies to watch in 2025
We selected the top cybersecurity companies to watch in 2025, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi

Managed services
Managed IT - our philosophy as an MSP and MSSP for German companies.
We are convinced that you will remain our customer because you experience our added value every day. Not because a dependency forces you to remain our customer.

Philippe Strübbe

Cybersecurity
The latest cybersecurity challenges
Explore the latest cybersecurity challenges, from AI-driven threats to quantum risks, impacting organisations in an evolving threat landscape.

Usman Khan

Juniper Networks Netwerkbeheer
Juniper introduces Secure AI-Native Edge solution for unified security and network management
Juniper's Secure AI-Native Edge solution integrates security and network management under Mist AI, enhancing operational efficiency, visibility, and protection.

Company update
Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital
Nomios strengthens cybersecurity service offering by acquiring Dionach, with the support of Keensight Capital

Network infrastructure Juniper Networks
When only the toughest will do: Discover Juniper's EX4100-H Switch
The Juniper Networks EX4100-H Ethernet Switch delivers robust, AI-enhanced connectivity and security for demanding environments, ensuring reliable performance in extreme conditions.

NIS2
Achieving NIS2 compliance in industrial companies
Thousands of industrial companies will be affected by the implementation of NIS2, with issues varying widely from one entity to another. We present you 12 steps to achieve compliance.

Arnaud Masson

Firewall Fortinet
FortiGate - the Sophos SG, XG and XGS firewall alternative.

Philippe Strübbe

Network segmentation Network security
Prevent lateral compromise with micro-segmentation
Why network micro-segmentation matters for network security and how it helps mitigate the spread of lateral compromise.

Herwig Mertens
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.