adacom loader
Please Wait

Resources

Unlocking NIS2 Compliance: Microsoft Security Solutions and ADACOM AI Driven XDR image
Unlocking NIS2 Compliance: Microsoft Security Solutions and ADACOM AI Driven XDR
Re-certification by the Hellenic Telecommunications & Post Commission (EETT) image
Re-certification by the Hellenic Telecommunications & Post Commission (EETT)
ADACOM as a Gold Sponsor in the 14th Infocom Security Conference & Expo image
ADACOM as a Gold Sponsor in the 14th Infocom Security Conference & Expo
Innovative Cybersecurity Solution - AI-Driven XDR image
Innovative Cybersecurity Solution - AI-Driven XDR
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing image
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order image
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order
New AI-Driven XDR Service from ADACOM on Microsoft Marketplace image
New AI-Driven XDR Service from ADACOM on Microsoft Marketplace
Proud to Be Recognized as a Great Place to Work image
Proud to Be Recognized as a Great Place to Work
The New and Improved e-SignIT Identity image
The New and Improved e-SignIT Identity
Red Alert for VPN image
Red Alert for VPN
Strong and Mutually Beneficial Partnership: ADACOM and DigiCert image
Strong and Mutually Beneficial Partnership: ADACOM and DigiCert
Organizations now recognize cybersecurity breach as a strategic risk image
Organizations now recognize cybersecurity breach as a strategic risk
“The trusted companion on the path of digital change and the value of Cybersecurity” image
“The trusted companion on the path of digital change and the value of Cybersecurity”
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
ADACOM CY at 8th PAII Conference 2023 image
ADACOM CY at 8th PAII Conference 2023
ADACOM at 13th Infocom Security Conference & Expo 2023 image
ADACOM at 13th Infocom Security Conference & Expo 2023
Double Gold Award for ADACOM at Cyber Security Awards 2023 image
Double Gold Award for ADACOM at Cyber Security Awards 2023
ADACOM awarded for “Security Supervisor and Development of ISMS” in SYZEFXIS II image
ADACOM awarded for “Security Supervisor and Development of ISMS” in SYZEFXIS II
ADACOM CY at 1st Cyber Security weekend 2022 image
ADACOM CY at 1st Cyber Security weekend 2022
ADACOM CY at the 2nd Cyber Security Conference 2022 image
ADACOM CY at the 2nd Cyber Security Conference 2022