What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Industrial company NIS2Industrial company NIS2

NIS2

NIS2 requires industrial companies to make major efforts to secure their IoT environments: Where to start?

Thousands of industrial companies will be affected by the implementation of NIS2, with issues varying widely from one entity to another. We present you 12 steps to achieve compliance.

Arnaud Masson
Placeholder for ARMARM

Arnaud Masson

4 min. read
Placeholder for Two men looking at a laptopTwo men looking at a laptop

Cloud security Endpoint security

The importance of Secure Web Gateway (SWG)

This article introduces Secure Web Gateways (SWG), covering key features, deployment options, scalability, organizational benefits, and integration.

2 min. read
Placeholder for Wind power clouds greenWind power clouds green
Juniper Networks

AI-driven enterprise

Transforming enterprises with AI: The new paradigm of AI-driven innovation

In the rapidly evolving business landscape, an AI-driven enterprise leverages automation, data-driven insights, and enhanced engagement to fundamentally transform its operations and stay ahead of the curve.

2 min. read
Placeholder for I Stock 157531192I Stock 157531192

Cybersecurity Artificial Intelligence

AI in cybersecurity: A double-edged sword

AI enhances cybersecurity with quicker threat identification, proactive measures, and automated efficiency, yet presents challenges like evolving threats, ethical concerns, and a skills gap, necessitating a comprehensive defense approach.

3 min. read
Placeholder for Juniper AI-Native Networking PlatformJuniper AI-Native Networking Platform
Juniper Networks

Mist AI AI-driven enterprise

What is the new Juniper AI-Native Networking Platform?

Juniper Networks' AI-Native Networking Platform, including Marvis Minis, revolutionises network management with AI-driven efficiency and proactive problem-solving.

1 min. read
Placeholder for Shadow ITShadow IT

Network automation

How automation centralises your tools and processes: A journey towards enhanced IT efficiency

Automation transforms IT roles, centralizing tools for efficiency, fostering innovation, and ushering in a new era of strategic growth in the sector.

2 min. read
Placeholder for Adobe Stock 598538455Adobe Stock 598538455

SIEM

The 8 factors you should consider before implementing a SIEM

Implementing a SIEM system involves key steps like defining objectives, ensuring compatibility, calculating costs, assessing skills, ensuring compliance, evaluating infrastructure, selecting a reliable vendor, and future-proofing for cybersecurity.

2 min. read
Placeholder for Joshua coleman ygp2y U QMEQ unsplashJoshua coleman ygp2y U QMEQ unsplash
Juniper Networks

Juniper Networks HPE

HPE's strategic leap with Juniper Networks acquisition

Hewlett Packard Enterprise's (HPE) decision to acquire Juniper Networks for an estimated $14 billion is a testament to its strategic foresight in the evolving landscape of AI-driven networking.

3 min. read
Placeholder for Engineer focused on taskEngineer focused on task

Cybersecurity

Secure your future: Top cybersecurity trends for 2024

We’re on the brink of a new year again. Time to learn all about the most important and interesting cybersecurity trends for 2024.

Mohamed El Haddouchi
Placeholder for Mohamed El HaddouchiMohamed El Haddouchi

Mohamed El Haddouchi

10 min. read
Placeholder for DMARC google yahoo emailsDMARC google yahoo emails

Email security

DMARC - From February 2024 your emails to gmail and yahoo could be rejected

By February 2024, Google and Yahoo will be imposing strict new rules on email security. Companies will be required to adopt DMARC authentication technology.

Romain Quinat
Placeholder for Romain QuinatRomain Quinat

Romain Quinat

3 min. read
Placeholder for Looking at SOC security trendsLooking at SOC security trends

SOC NOC

NOC vs SOC: Unveiling differences and uniting strengths

NOC and SOC are essential in digital enterprises, combining network management with cybersecurity for resilient IT operations.

4 min. read
Placeholder for Pascal meier X Ml VD Tu E Hpg unsplashPascal meier X Ml VD Tu E Hpg unsplash

SD-WAN

Top 5 SD-WAN solutions for 2024

Discover the top SD-WAN solutions for 2024 and how they enhance performance, flexibility, and security. Make informed choices for your network.

8 min. read
Placeholder for Looking at SOC security trendsLooking at SOC security trends

SOC Cybersecurity

Navigating the 2024 cybersecurity landscape: Key trends in SOC security

A security operations centre (SOC) offers the security tools and knowledge that you need to keep your IT environment safe. Read all about the SOC security trends of 2024.

Avinash Shet
Placeholder for Avinash shetAvinash shet

Avinash Shet

5 min. read
Placeholder for Operational Technology (OT)Operational Technology (OT)

OT security

Trends and expectations for OT security in 2024

The traditional gap between IT and OT is gradually disappearing. This article explores what this means for OT security and looks at the major OT security trends for 2024.

Rachid Groeneveld
Placeholder for Rachid GroeneveldRachid Groeneveld

Rachid Groeneveld

10 min. read
Placeholder for Managed PKI telcoManaged PKI telco

Managed services Telco

Elevating operational technology security with managed PKI: A telco perspective

Managed PKI services simplify and secure digital identity and certificate management for telco operators transitioning to 5G.

2 min. read
Placeholder for Text on a laptop screenText on a laptop screen

NGFW Firewall

Top 5 NGFW solutions for 2024

Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks continue to become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.

10 min. read
Placeholder for Hetportretbureau LR T1 A6437Hetportretbureau LR T1 A6437

Cybersecurity

Top cybersecurity companies to watch in 2024

We selected the top cybersecurity companies to watch in 2024, who have successfully differentiated themselves from other players in the market.

Mohamed El Haddouchi
Placeholder for Mohamed El HaddouchiMohamed El Haddouchi

Mohamed El Haddouchi

19 min. read
Placeholder for Man sitting behind laptopMan sitting behind laptop

SIEM

The benefits of outsourcing SIEM management

Explore the perks of SIEM outsourcing: scalability, expertise, cost savings, and continuous monitoring for superior cybersecurity.

Parm Dhillon
Placeholder for Parm DhillonParm Dhillon

Parm Dhillon

3 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.