adacom loader
Please Wait

Resources

ADACOM and BYTE Shine as Platinum Sponsors at Fortinet Security Day image
ADACOM and BYTE Shine as Platinum Sponsors at Fortinet Security Day
Preparing for the Quantum Threats: A Strategic Approach to Quantum Computing image
Preparing for the Quantum Threats: A Strategic Approach to Quantum Computing
Red Alert for VPN image
Red Alert for VPN
Poseidon Shield: Holistic Cybersecurity Framework for Shipping Companies by ADACOM image
Poseidon Shield: Holistic Cybersecurity Framework for Shipping Companies by ADACOM
Navigating the Digital Operational Resilience Act (DORA): A Comprehensive Guide image
Navigating the Digital Operational Resilience Act (DORA): A Comprehensive Guide
ADACOM Cyprus Contribute to Microsoft Experience Day by Chrisons Co. Ltd image
ADACOM Cyprus Contribute to Microsoft Experience Day by Chrisons Co. Ltd
Re-certification by the Hellenic Telecommunications & Post Commission (EETT) image
Re-certification by the Hellenic Telecommunications & Post Commission (EETT)
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing image
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing
ADACOM Participated in the 40th Athens Marathon – the Authentic image
ADACOM Participated in the 40th Athens Marathon – the Authentic
ADACOM Sets New Standards in Cybersecurity Achieving Five Specializations image
ADACOM Sets New Standards in Cybersecurity Achieving Five Specializations
Celebrating Success of ADACOM at Archer Summit 2023 image
Celebrating Success of ADACOM at Archer Summit 2023
Tailored Solutions for Every Organizational Need - Interview with Sofia Kanavou image
Tailored Solutions for Every Organizational Need - Interview with Sofia Kanavou
Digital Resilience: A Vital Strategy for Protecting Organizations Against Modern Threats image
Digital Resilience: A Vital Strategy for Protecting Organizations Against Modern Threats
Beyond Compliance: Leverage DORA for Competitive Advantage image
Beyond Compliance: Leverage DORA for Competitive Advantage
AI-Driven DataGuard: Επαναπροσδιορίζοντας την Προστασία Δεδομένων  image
AI-Driven DataGuard: Επαναπροσδιορίζοντας την Προστασία Δεδομένων 
The Need for Strong Authentication (Human IDs and Non-Human IDs) image
The Need for Strong Authentication (Human IDs and Non-Human IDs)
Τάσεις & εξελίξεις στην Κυβερνοασφάλεια για το 2025: Καινοτομία, Προκλήσεις & Ευκαιρίες image
Τάσεις & εξελίξεις στην Κυβερνοασφάλεια για το 2025: Καινοτομία, Προκλήσεις & Ευκαιρίες
NIS2 and Critical Infrastructure: What Business Leaders Need to Know image
NIS2 and Critical Infrastructure: What Business Leaders Need to Know
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense image
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense
ADACOM Participates Successfully as an Exhibitor at the Annual Conference of the PSEAD image
ADACOM Participates Successfully as an Exhibitor at the Annual Conference of the PSEAD
ADACOM Partner of the Year 2024 by CyberArk image
ADACOM Partner of the Year 2024 by CyberArk
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA image
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA
Participation in the Roundtable on the New European NIS 2 Directive image
Participation in the Roundtable on the New European NIS 2 Directive
ADACOM at the 12th Information Security Conference image
ADACOM at the 12th Information Security Conference