News, Press Releases & Events

070624 ADACOM DIGICERT POST 1080x1080 B ADACOM Receives 7th Consecutive Platinum Partner Certificate from DigiCert (6/7/2024) - ADACOM is pleased to announce that DigiCert has awarded it the Platinum Partner Certificate for the 7th consecutive year. This recognition reflects ADACOM's exceptional level of commitment to the DigiCert Affiliate Program and strong partnership that maximizes its value by providing the best business opportunities for growth and fullest customer support. The continuation of our… Read More
030624 ADACOM LAGOU ARTICLE POST 1080x1080 A A safer and more digitally resilient Europe with NIS2 (6/4/2024) - Panagiota Lagou, Senior Manager in Cybersecurity Consulting at ADACOM, spoke to IT Security PRO about the new NIS2 (Network and Information Systems) directive, which is the modernization of the previous NIS directive in the European Union. The NIS2 focuses on: enhancing cybersecurity improving preparedness and resilience against cyber threats protect critical service networks and IT… Read More
310524 ADACOM TECHNOLOGY IN ACTION POST 1080x1080 A ADACOM CY as Gold Sponsor at the 4th Technology-In-Action Conference (5/31/2024) - The 4th Technology-In-Action Conference and Exhibition took place on May 22nd at Kousioumis Estate. The event was a great success, with ADACOM Cyprus, a subsidiary of IDEAL Holdings and a leading provider of cybersecurity and security management services was the Gold Sponsor. The highlight of the conference was the speech delivered by Altani Batoudaki, General… Read More
270524 ADACOM XRHMA ARTICLE POST 1080x1080 A ADACOM’s Cybersecurity Solutions in Xrima Magazine (5/28/2024) - Nikitas Kladakis, the General Manager of ADACOM, shared insights in an article in the Xrima magazine, highlighting how ADACOM effectively addresses complex and specialized threats faced by companies through its comprehensive range of solutions and services. One of the key solutions for dealing with such threats is the AI-DRIVEN Extended Detection and Response (XDR) service,… Read More
240524 ADACOM SPONSORS CHECKPOINT POST 1080x1080 B ADACOM as Lunch Sponsor in Cyber Leaders Summit 2024 (5/25/2024) - ADACOM, a subsidiary of IDEAL Holdings, participated in the Cyber Leaders Summit 2024, which was organized by our partner @checkpoint and took place on May 22 at the Benaki Museum, where ADACOM served as a Lunch Sponsor.   During the summit, Nikitas Kladakis, General Manager of ADACOM, delivered an outstanding speech that highlighted the strategic alliance… Read More
220524 ADACOM PSEAD POST 1080x1080 A ADACOM Cyprus’ Successful Participation in PSEAD Conference 2024 (5/23/2024) - The participation of ADACOM Cyprus, a subsidiary of Ideal Holdings and a leading provider of cybersecurity and security management services, in the 9th Pancyprian Association of Insurance Intermediaries Conference entitled "The Day After" held on Tuesday 21 May at the Strovolos Municipal Theatre, was crowned with success.    Special mention deserves the excellent speech of Altani… Read More
290424 ADACOM MICROSOFT POST 1080x1080 B ADACOM Attains Threat Protection Advanced Specialization (4/30/2024) - ADACOM, the leading Qualified trust services and Managed Security services Provider and Cyber Security Integrator, is excited to announce that it has achieved advanced specialization in Threat Protection for Microsoft Partners.   This designation is reserved for Microsoft Partners with active Gold Competencies, showcasing their extensive expertise in specific technologies and highlighting ADACOM’s proficiency in deploying… Read More
230424 ADACOM EUDI WALLET ARTICLE POST 1080x1080 d EUDI Wallet, the journey towards electronic identity and the associated challenges (4/25/2024) - In a recent feature article within the special edition of “Business in the Digital Age” by “Vima Kiriakis”, Panos Vassiliadis, IDEAL Holdings and its subsidiary ADACOM CEO, discussed EUDI Wallet, the journey towards electronic identity, and the associated challenges.  The European Union (EU) is rolling out the European Union Digital Identity Wallet (EUDI Wallet) to… Read More
190424 ADACOM EVENT MICROSOFT POST 1080x1080 b Unlocking NIS2 Compliance: Harnessing Microsoft Security Solutions and ADACOM AI Driven XDR for Organizational Security (4/23/2024) - ADACOM, a subsidiary of IDEAL Holdings, in collaboration with Microsoft, hosted highly successful events on Tuesday, March 26th, at the CEO CLUBS in Athens, and on Thursday, April 11th, 2024, at the MAP Boutique Hotel in Nicosia.  The events were attended by executives and representatives from diverse market sectors who were briefed on developments in… Read More
220424 ADACOM EETT CERTIFICATE POST 1080x1080 B ADACOM’s re-certification by the Hellenic Telecommunications & Post Commission (EETT) (4/22/2024) - ADACOM’s re-certification for its compliance with the requirements of the EU Regulation 910/2014 (eIDAS) has been endorsed by the Hellenic Telecommunications & Post Commission (EETT). Therefore, ADACOM, an IDEAL Holdings subsidiary, continues to hold its status as a Qualified Trust Service Provider and its place in the National Trust List (TSL)  maintained for more than… Read More
120424 ADACOM INFOCOM EVENT POST 1080x1080 2 ADACOM as a Gold Sponsor in the 14th Infocom Security Conference & Expo 2024 (4/18/2024) - ADACOM participated as a Gold Sponsor in the 14th Infocom Security Conference & Expo on 10th and 11th of April and had a successful presence.  The two-day event was an insightful and productive gathering, bringing together cybersecurity experts from various industries assembled to network and share ideas.   Nikitas Kladakis, General Manager ADACOM, shared insights on… Read More
150424 ADACOM IT SECURITY PRO ARTICLE POST 1080x1080 2 ADACOM’S Innovative Cybersecurity Solution – AI-Driven XDR (4/10/2024) - Nikitas Kladakis, General Manager of ADACOM, in a recent article in IT Security PRO talked about ADACOM'S Innovative Cybersecurity Solution - AI-Driven XDR.   ADACOM invests in systems and services that can detect and respond to AI-based or enhanced cyberattacks.   This service is provided by our state-of-the-art Security Operation Center (SOC) and is an… Read More
030424 ADACOM ENISA POST 1080x1080 ADACOM Experts Contribute to ENISA’s Report on Remote Identity Proofing (4/3/2024) - ENISA, the European Union Agency for Cybersecurity, has recently released a new report that aims to enhance stakeholder awareness, facilitate risk analysis in evolving threat landscapes, and bolster trustworthiness in remote identity-proofing methods. The report is a result of the hard work and dedication of ADACOM colleagues Evangelia Papadaki, Panagiota Lagou, and Eirini Papamichail, who… Read More
Global business, internet network connection, IoT Internet of Things, business intelligence concept. Busines global network, futuristic technology background. AI generative The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order (3/6/2024) - by Fotis Ailianos - ADACOM Cyber Defence Operations Manager  The US Armed Forces have defined cyberspace as a domain that transcends all traditional domains of warfare. If we take a closer look at today’s conflicts and turbulence, we will realize that the digital landscape, a frontier of innovation and collaboration, echoes the complexities of international… Read More
Silver Award IDIKA ADACOM 2 1920x1080 Silver Award for IDIKA SA and ADACOM at Cyber Security Awards 2024 (2/8/2024) - IDIKA S.A. and ADACOM participated in the Cyber Security Awards 2024, an event that recognizes excellence and innovation in cybersecurity and rewards best practices, right tools, equipment and services for cyber security management and data security, in private and public sector organizations, and critical infrastructures. IDIKA S.A. and ADACOM participated in the category of “Cyber… Read More
Online security dark background. 3d illustration Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age (1/18/2024) - by Panagiotis Vassiliadis, CEO of IDEAL Holdings   The evolution of technology, the ever-increasing use of the cloud, and new working models contribute to the increasingly widespread dispersion of sensitive data, often outside the direct control of organizations. This makes them vulnerable to financial fraud and ever-increasing cybercrime. At the same time, the digitization of… Read More
300x250 IDEAL Holdings has a diversified portfolio of ideal investments (12/4/2023) - In IDEAL Holdings, we have created a sustainable portfolio of diverse businesses, all of them sharing a common trait: Strength. In retail, with Attica department stores, the ultimate shopping destination boasting over 1,100 brands in 69.000 square meters and 5.000.000 visitors per year In technology, with Byte, one of the largest IT companies in Greece,… Read More
ΠΣΕΑΔ CONFERENCE 2023 2 ADACOM CY at PAII 2023 Conference (5/24/2023) - Mrs. Altani Batoudaki, Director Manager of ADACOM CY, at the 8th Pancyprian Association of Insurance Intermediaries Conference held on 24 of May 2023, shared remarkable insights that were presented during her speech about Cyber Defense Challenges in Insurance Industry In an era where data is the lifeblood of industry, prioritizing robust data security practices is… Read More
1680603143132 ADACOM at Infocom Security Conference 2023 (4/27/2023) - ADACOM participated as Platinum Sponsor in the “13th InfoCom Security 2023 Conference & Expo” organized by SMART PRESS & IT PROFESSIONAL magazine on 26th & 27th of April 2023. Through the central notion of “The Power of AI in Cyber Security”, the 13th Infocom Security – the leading event in the field of IT technologies… Read More
190753408 m normal none 2048x1152 1 “The trusted companion on the path of digital change and the value of Cybersecurity” – Article in (4/7/2023) - In "THE DIGITAL TRANSFORMATION CHALLENGE" section of the financial site, an article by ADACOM was uploaded regarding the value of cyber security in the digital transformation projects of businesses and organizations. You can view the full article (in Greek)  here.   Read More
Zero Trust Security “Zero Trust starts with Zero Touch” by Nikitas Kladakis (3/15/2023) - ADACOM for real-time threat detection and response, has adopted Artificial Intelligence technologies and Machine Learning algorithms. Taking a step further, adopted also the Zero Trust with Zero Touch model, through the integration of the eASIS Threat Management Platform (based on IBM QRadar) with the Cisco Secure Workload solution.    Zero Trust with Zero Touch  … Read More
ADACOM CS23 Awards Double Gold Award for ADACOM at Cyber Security Awards 2023 (3/9/2023) - ADACOM (a company of IDEAL Holdings SA portfolio) participated in the Cyber Security Awards 2023, an event highlighting and rewarding best practices, right tools, equipment and services for cyber security management and data security, in private and public sector organizations, and critical infrastructures.   With cyber-attacks becoming increasingly sophisticated and frequent, it is extremely necessary for… Read More
2023 Adobe integration schema ADACOM Qualified Electronic Signatures (QES) services integrated with ADOBE Acrobat Sign (2/20/2023) - ADACOM, as a Qualified Trust Service Provider (QTSP) and a subsidiary company of IDEAL Holdings SA, announces that it has efficiently integrated its Remote Qualified Electronic Signatures (ADACOM Remote QES) services with the Adobe Acrobat Sign signing platform through interfaces compatible with the latest implementation of the Cloud Signature Consortium (CSC) API standard. That means,… Read More
Syzeuxis II KtPAE 550 Adacom has been awarded for “Security Supervisor and Development of ISMS” in SYZEFXIS II (2/7/2023) - ADACOM, a subsidiary company of IDEAL Holdings, has been declared the contractor of the project "Security Supervisor and Development of Information Security Management System (SDAP) of the Public Sector Network – SYZEFXIS II". The contract’s duration is set at thirty-six (36) months and the award was made for 1.6 million euros, including VAT. The scope… Read More
ADACOM MSS integration with CHECKPOINT ADACOM’s Managed Security Services integrated with CheckPoint Technologies (12/20/2022) - ADACOM has been ensuring the smooth and safe operation of its customers’ organizations for over 20 years, helping to secure the digital transformation of their business processes and procedures. It prevents, detects and responds swiftly to both identifiable and zero-day threats, with its many years of expertise, worldwide know-how, combined with the high training and… Read More
ITD2022 1200x630 NETBULL at IT Directors Forum 2022 (11/1/2022) - Netbull, an IDEAL Holdings subsidiary, participated as Grand Sponsor in the "IT Directors Forum 2022" organized by BOUSSIAS Communications on Tuesday 1st of November 2022. The 17th IT Directors Forum, as indicated by its motto “RevisITing Leadership in the Digital-First era”, is giving emphasis to critical topics, such as uncovering design and implementation issues of… Read More
1080X1080 BANNERS CYBER SECUR ADACOM ADACOM CY at the 2nd Cyber Security Conference (10/26/2022) - ADACOM Cyber Security CY Ltd. was participated as Sponsor at the  2nd Cyber Security Conference, which took place on 26th of October 2022, at Hilton Nicosia Hotel, with theme "Safeguarding the digital economy". The objective of the Cyber Security Conference is to provide insights into setting up, maintaining and improving information security, protection against hybrid… Read More
fortninet security day 500x500 ADACOM at Fortinet Security Day 2022 (10/5/2022) - ADACOM Cyber Security was participated as Platinum Sponsor at annual Fortinet Security Day conference, which took place on 4th of October 2022, at the Megaron Athens Concert Hall - Banqueting Hall, in Athens. The theme of the conference was "Securing the Digital World". Fortinet’s security experts and their partners, during their presentations, were answered  the… Read More
Identity Proofing.. Remote Identity Proofing (9/28/2022) - NEW Remote Identity Proofing Service by ADACOM ADACOM as a Qualified Trust Service Provider (QTSP), recently activated following the relevant approval of EETT, the operation of the new remote identity proofing service. This new service complies with Article 24 par. 1d of the eIDAS regulation and is equivalent to the verification of the subscriber's details… Read More
adacom in ShipIT 2022 3 ADACOM sponsorship in ShipIT Conference 2022 (9/26/2022) - ADACOM participates as a Sponsor in the "ShipIT Conference 2022" organized by netweek magazine of BOUSSIAS Communications and A.M.M.I.TE.C.(Association of Maritime Managers in Information Technology & Communications), under the auspices of International Security Forum / ISF and Norwegian Center for Cybersecurity in Critical Sectors (NORCICS), on Tuesday 26th of September 2022. This one-day strategic event… Read More
adacom news generic1 Revocation of old ADACOM Certification Authorities (10/29/2021) - Revocation of old ADACOM Certification Authorities ADACOM informs its Subscribers that, in the context of upgrading its trust services and following the relevant international standards for Qualified Certificates, it ceased the issuance of Qualified Certificates for Electronic Signatures and Electronic Seals from the following Certification Authorities on 23rd October 2020: ADACOM CA for EU Qualified… Read More
adacom news generic1 Replacement of ADACOM Certification Authorities for Class 1 and Class 2 Certificates (10/20/2021) - Replacement of ADACOM Certification Authorities for Class 1 and Class 2 Certificates   ADACOM informs its Subscribers that, in the context of upgrading its trust services and following the relevant international standards for non-qualified certificates, it has created the following new Certification Authorities for Class 1 and Class 2 certificates: Adacom S.A. Class 1 -… Read More
cybersecurity consultant 1 ADACOM CyberSecurity advisor of Zepos & Yannopoulos Law Firm (10/18/2021) - ADACOM CyberSecurity advisor of Zepos & Yannopoulos Law Firm Adacom Cyber Security, subsidiary company of IDEAL Group, Cyber Security Advisor of Zepos & Yannopoulos supported the organisation in the enforcement of an Information Security System in compliance with ISO27001 standard. With the adoption of required technical and organizational controls, Zepos & Yannopoulos was certified with… Read More
Cybersecurity Governance in Distributed Business Models 1 Cybersecurity Governance in Distributed Business Models (10/12/2021) -   by Anastasios Arampatzis  With businesses adopting a distributed business model, where data, applications and services are hosted by multiple, dispersed cloud environments, executives and security teams need to make decisions about cybersecurity risk. How can organizations control, direct and communicate their cybersecurity risk management activities? Let’s have a deep dive into cybersecurity governance.  What… Read More
Access Management for Modern Organizations Access Management for Modern Organizations (9/27/2021) - by Anastasios Arampatzis During the past 18 months, organizations across all industries and sectors have faced and responded to unparalleled challenges, which were the driver of an accelerated cloud adoption and remote work models. The increased pace of digital transformation introduces numerous benefits and opportunities, as well as greater threats. IT security teams have realized that traditional… Read More
GRIDS banner big final ADACOM invites you to the Online Workshop: Identity Attribute and KYC: the transition to eIDAS 2.0 and AMLR era (9/7/2021) - Remote identity management and KYC : what are the ongoing cases andperspectives ? Identity Attribute and KYC: the transition to eIDAS 2.0 and AMLR era On September 16, the teams of GRIDS* and eIB** projects invite you to an online Workshop, with distinguished guest speakers.  Our workshop will explore the eID needs and the design… Read More
iron mountain and adacom ADACOM and Iron Mountain partner to issue digital signatures (7/29/2021) -     IRON MOUNTAIN HELLAS, the leading provider of records management solutions in Greece, enters into a partnership with Adacom, offering its customers the ability to use digitally certified/remotely approved electronic signatures in their digital documents, through the Content Services Platform (CSP). Through this partnership, companies will now be able to sign their documents using… Read More
What are the EU guidelines on IT security insurance What are the EU guidelines on IT security insurance? (6/22/2021) - by Anastasios Arampatzis  On 12 October 2020, the European Insurance and Occupational Pensions Authority (EIOPA) issued its Guidelines on Information and Communication Technology Security and Governance (“the Guidelines”). The Guidelines will come into force on 1 July 2021 and shall apply to both individual undertakings and mutatis mutandis at the group level.  Background information  The increasing complexity… Read More
chris pagan sfjS FglvU4 unsplash scaled ADACOM – Cybersecurity advisor of Technomar Shipping Inc. (6/9/2021) - ADACOM Cyber Security, an IDEAL subsidiary, became the Cybersecurity advisor of Technomar Shipping Inc., a fast growing shipping company. With ADACOM support, Technomar enhanced the level of protection of information managed in the company (seafarers, charterers, cargo), enforcing technical and organizational controls in adherence with ISO27001 standard. These controls contribute not only into strengthening the… Read More
Verizon 2021 Data Breach Investigations Report Verizon 2021 Data Breach Investigations Report: The Day After Tomorrow (6/8/2021) - by Anastasios Arampatzis  Why do we need all these annual reports published every year, this time around? This is a question that popped into my mind as I was preparing myself to write this article. What is their objective, their benefit? Well, the truth is that these reports are a great resource of reflection – they… Read More
What is the added value of PCI DSS compliance 00000002 What is the Added Value of PCI DSS Compliance? (5/25/2021) - by Anastasios Arampatzis  During 2020, credit card and contactless transactions skyrocketed as a response to hygiene and restriction measures to contain the pandemic. Besides the obvious benefits for both retailers and consumers, there are concerns about the security of these transactions and the card holder data associated with these transactions. Retailers need to ensure that they… Read More
Securing the Medical Sector is a Matter of Life and Death Securing the Medical Sector is a Matter of Life and Death (5/11/2021) - by Anastasios Arampatzis In the previous two articles we had discussed the importance of Operational Technology (OT) security to the health and safety of employees and local communities and to preserving the environment, while underlying the crucial function in the pharmaceutical industry. In this article we are going to touch upon the necessity of cybersecurity… Read More
adacom prosklisi page 0001 ADACOM at Infocom Security 2021: From CyberSecurity … to Cyber Resilience (4/26/2021) - ADACOM is pleased to announce its 6th participation as a Sponsor in this year's 11th Infocom Security Conference. InfoCom Security 2021 - being the largest conference event in Greece for Information Security and Data Protection - took place for another year with great success on April 21, 22 and 23! Participants had the opportunity to… Read More
components effective pharmaceutical cybersecurity What are the components for effectively securing the pharmaceuticals? (4/20/2021) - by Anastasios Arampatzis In our previous article we discussed the repercussions of cyber-attacks, affecting the targeted organizations, the health and safety of employees and local communities, as well as the environment. A sector that makes the news headlines for all the right reasons is the pharmaceutical industry. Pharmaceutical companies are responsible for producing and distributing… Read More
How OT Security affects Health Safety and Environment e1617698388966 How OT Security affects Health, Safety and Environment (4/6/2021) - by Anastasios Arampatzis The information technology (IT) and operational technology (OT) domains are converging. According to Automation, 82% of survey respondents worked at organizations where IT - OT collaboration was either in its early stages or already a productive business reality. In addition, Gartner estimates that 50% of OT service providers would partner with IT-centric… Read More
Zero Trust is a Security Mindset Zero Trust is a Security Mindset (3/23/2021) - by Anastasios Arampatzis "Trust is like blood pressure. It's silent, vital to good health, and if abused it can be deadly." --Frank Sonnenberg, author of Follow Your Conscience - "Trust, but verify." --Ronald Reagan   As cybersecurity professionals defend increasingly distributed and complex corporate networks from sophisticated cyber threats, embracing a Zero Trust security model… Read More
Picture1 3 ADACOM and Scytáles enter partnership for the Digital Vaccination Certificate for use on mobile devices (3/19/2021) - ADACOM S.A.  a Provider of Trust Services (QTSP) and Cybersecurity Solutions and Scytáles AB announce the expansion of their cooperation in the field of Green Digital Vaccination certificate in Greece, Cyprus, and the Balkans.  Scytáles recently announced the "Green Pass – Mobile Vaccination Passport and Certification Service", which is based on an International Reading Standard… Read More
Cybersecurity Needs To Be Integrated Into Business Continuity Plans Cybersecurity Needs To Be Integrated Into Business Continuity Plans (3/9/2021) - by Anastasios Arampatzis Business continuity and cybersecurity used to be siloed processes, but the evolving cyber threat landscape dictates the need for organizations to change their approach and merge cybersecurity into business continuity plans. Traditionally, a Business Continuity and Disaster Recovery plan is in place to get businesses and their infrastructures up and running following… Read More
supply chain 3 Supply Chain Attacks are a Real Threat to National Security (2/23/2021) - by Anastasios Arampatzis The SolarWinds hack was an extremely serious compromise of the United States’ infrastructure. Industries and critical infrastructures are increasingly dependent on digital technology. Their openness, interconnectivity, and interdependence on supply chains has created a large threat and attack surface, which adversaries are eager to probe and exploit. What are supply chain risks?… Read More
supply chain Lessons learned from a Supply Chain Cyber Security Attack (2/9/2021) - by Anastasios Arampatzis   During the last days of 2020 and the first days of 2021, the cybersecurity news were flooded with the apocalypse of the SolarWinds supply chain attack. Now that the dust begins to settle, it is a good time to reflect on the event and see what we can learn from that.… Read More
Smart Electric Grid Demands Smart Security Smart Electric Grid Demands Smart Security (11/23/2020) - by Anastasios Arampatzis Security of electric grid is a national security issue The electric grid delivers the electricity that is essential for modern life. The reliability of the grid and its ability to meet consumers’ demands at all times is of national interest. The grid’s reliability can be impaired by cyberattacks on the IT and… Read More
iot How can Device certificates secure IoT communications? (11/16/2020) - by Anastasios Arampatzis The proliferation of IoT in industrial settings, provides an added value, transforming manufacturing, transportation, power generation and a variety of other industries with greater automation, new services, and more efficient allocation of resources. However, Industrial IoT (IIoT) has increased the threat surface with many industries being the victim of some of the… Read More
Defense in Depth Cybersecurity in the Oil and Gas Industry Defense-in-Depth Cybersecurity for the Oil and Gas Industry (11/2/2020) -   by Anastasios Arampatzis Greece is about to become an energy hub for the European Union. The Trans Adriatic Pipeline (TAP) and EastMed pipeline will transport much needed natural gas to the industries and homes of the EU member states in the framework of minimizing CO2 emissions and mitigating the climate change effects. Cyber threats… Read More
How Can We Secure Modern Maritime Communications How Can We Secure Modern Maritime Communications? (10/26/2020) - by Anastasios Arampatzis A new generation of digital maritime communications The emergence of new technologies in the early twentieth century caused a sharp increase in maritime trade, which led to more traffic and the consequent need to monitor such traffic. This was the backdrop to the appearance of the first communications systems for improving maritime… Read More
close up male hands using laptop home scaled e1603271059130 Εγκεκριμένες ψηφιακές υπογραφές ADACOM στην πλατφόρμα DocuSign (10/21/2020) -   Τη χρήση της εγκεκριμένης ηλεκτρονικής τους υπογραφής, μπορούν πλέον να χρησιμοποιούν στο περιβάλλον της DocuSign, οι κάτοχοι εγκεκριμένων ψηφιακών πιστοποιητικών της ADACOM, εξασφαλίζοντας έτσι ότι η υπογραφή που εφαρμόζουν στο έγγραφο, φέρει θέση ιδιόχειρης υπογραφής. Η υιοθέτηση ηλεκτρονικών υπογραφών, αποτελεί ένα σημαντικό βήμα στον ψηφιακό μετασχηματισμό επιχειρήσεων και οργανισμών. Η Info Quest Technologies, έχει… Read More
Weak Maritime Cybersecurity Poses Environmental Risks 2 Weak Maritime Cybersecurity Creates Environmental Risks (10/19/2020) -   by Anastasios Arampatzis Modern ships carry onboard a plethora of IoT sensors to optimize performance and reduce fuel consumption. Besides those performance-driven sensors, ships are equipped with IoT sensors to monitor oil spills which communicate via satellite communications to send imagery and data back to the shore. Implementing weak cybersecurity measures to protect the… Read More
How Can TLS Certificates Secure Smart Shipping How can TLS certificates Secure Smart Shipping? (10/12/2020) - by Anastasios Arampatzis   “A sea” of connected devices Using IoT devices and sensor systems in commercial vessels helps ship owners gain a competitive edge, by harnessing the full potential of data for more effective operations and decision-making. The ship-to-shore connectivity was revolutionized by the proliferation of IoT (Internet of Things), creating a world of… Read More
The Shipping Industry Needs Cyber Resilience Shipping Industry Needs to Be Cyber Resilient (10/5/2020) - by Anastasios Arampatzis On 28 September 2020, the French shipping giant CMA CGM announced that it has been hit by Ragnar Locker ransomware attack, taking down its worldwide shipping container booking system. What is amazing is that now all four biggest maritime shipping companies in the world have been hit by cyber-attacks in the past… Read More
image3 How Can Organisations Assess Cyber Resiliency? (9/28/2020) -   by Anastasios Arampatzis Modern organisations need to be resilient not only to maintain business continuity during and after a cyber incident, but looking at a broader context, to be able to withstand and adapt to changes of their business environment. The COVID-19 pandemic only proved the importance of cyber resilience. To achieve that, organisations… Read More
grids Η ADACOM SERVICE PROVIDER HUB σε Ευρωπαϊκό έργο για την διασυνοριακή ηλεκτρονική ταυτοποίηση (9/23/2020) - Στα πλαίσια της Ευρωπαϊκής δράσης CEF (Connecting Europe Facility) η ADACOM, θυγατρική της IDEAL, σε συνεργασία με τις εταιρείες ATOS (Ισπανία), KOMPANY (Αυστρία), INFOCERT (Ιταλία) και το Παν. Αιγαίου  (Ελλάδα) ανέλαβαν την υλοποίηση και λειτουργία μιας πολυαρθρωτής πλατφόρμας (GRIDS -  increasinG tRust with eId for Developing business)  η οποία θα συνδυάσει τη χρήση μεθόδων διασυνοριακής… Read More
Techniques for Cyber Resiliency How Can Organisations Achieve Cyber Resiliency? (9/21/2020) - by Anastasios Arampatzis In our previous post we discussed the benefits that cyber resilience brings to organisations. These benefits highlight the importance of resiliency, especially if we consider the impact of orchestrated, sophisticated cyber-attacks to national critical infrastructures, such as energy, water, transportation, healthcare and financial. The importance of cyber resiliency is captured in the… Read More
The Importance Of Cyber Resilience Cyber Resilience Importance! (9/14/2020) - by Anastasios Arampatzis Digital transformation enabled organizations  to disrupt their markets, improve productivity and make informed decisions, while reducing costs. The proliferation of emerging technologies, such as multi-cloud platforms, Internet of Things (IoT), containerization, microservices, and big data has given the society the chance to become more connected and economies more prosperous. However, these benefits… Read More
grc covid Covid_19 : Cyber Threats & Trends (7/29/2020) - A vast number of controls related to Cyber Security are implemented through the use of particular cyber security solutions, and many other technologies and management processes such as audits, assessments, policies & procedures, etc. All these controls have been adopted and properly monitored in order to establish the required level of Cyber Security in an organization,… Read More
symantec2 Symantec Identifies Wave of Attacks Against U.S. Organizations (7/3/2020) - Attackers were preparing to attack dozens of U.S. corporations, including eight Fortune 500 companies. UPDATE June 30: Further investigation by Symantec has confirmed dozens of U.S. newspaper websites owned by the same parent company have been compromised by SocGholish injected code. Some of the organizations targeted by WastedLocker could have been compromised when an employee browsed… Read More
test site e1599838544667 Η ADACOM στο Digital Solidarity Greece (4/9/2020) - ADACOM POLICY, RISK ASSESSMENT & AWARENESS ON REMOTE ACCESS AND TELEWORKING Πολιτική, Εκπαίδευση και Αυτο-αξιολόγηση Ασφάλειας Απομακρυσμένης Πρόσβασης και Εργασίας Η ADACOM, στηρίζει έμπρακτα την πρωτοβουλία #DigitalSolidarityGR του Υπουργείου Ψηφιακής Διακυβέρνησης για προσφορά δωρεάν ψηφιακών εργαλείων και υπηρεσιών στις επιχειρήσεις & οργανισμούς της Ελλάδας, για όσο διαρκούν τα μέτρα για τον κορωνοϊό Covid-19. Αναλογιζόμενη τις… Read More
image e1572512959210 ADACOM organized the “CRYPTO THEORY & PRACTICES KNOWLEDGE BUILDING” course for ENISA (12/4/2019) - Knowledge Building on Cryptography organized by ENISA on 26-27 November was conducted efficiently providing interesting information to European Supervisory Bodies of Trust Services Sector. In the second part of the program managed by Adacom, presenters gave a holistic view covering all aspects of Trust Services such as: QTSPs, External auditors, Software and hardware tools used… Read More
49127291368 0a36bc90b9 o scaled ADACOM at 17th Bank Management Conference 2019 (11/28/2019) - We are delighted to sponsor the 17th Bank Management Conference 2019, cooperating with Digicert, our trusted partner. The 17th Bank Management Conference entitled “The Future-Ready Bank” is engaging Banking Executives, Thought Leaders, International Incumbents, Neo-Banks and Challenger Banks, as well as the Fintech ecosystem to explore the dynamics and the process of acquiring future-proof readiness.… Read More
IMG 3224 1 e1599839886514 ADACOM & CYNET Roundtable 2019 “Cynet 360 Introduction Day” (11/6/2019) -   ADACOM joined forces with CYNET and organized a Roundtable, called “Cynet 360 Introduction Day” on Tuesday 5th of November 2019. The Roundtable conducted by Cynet, was focused on Cynet 360, the world's first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration across the entire… Read More
Torsion logo e1571814791377 New cyber security partnership for ADACOM and Torsion Information Security (10/23/2019) - Adacom to introduce Torsion’s unique solution for Data Access Governance. Cyber security specialists Adacom are enriching its capabilities for helping customers control sprawling access to files and folders through a new partnership with Torsion Information Security. The partnership means that the Torsion solution, which gives visibility and control over sprawling access to files and folders… Read More
IMG 1300 “How to move your security to the cloud” conference by ADACOM 2019 (6/27/2019) - On June 2019, ADACOM in cooperation with Symantec and Fortinet organized the conference entitled “How to move your security to the cloud”. The conference took place at the Yacht Club of Greece and was focused on how security can enable the journey to the cloud. The participants came from a wide spectrum of the Greek… Read More
digital ADACOM proud sponsor of “Digital Business Transformation Conference 2019” (5/14/2019) - “Will you Survive or Thrive?” ADACOM Cyber Security in cooperation with Digicert is proud sponsor of the "4th Digital Business Transformation Conference" at Maroussi Plaza Conference Center, on Wednesday 15th of May. 4th Digital Business Transformation Conference entitled “Will you Survive or Thrive?”  focuses on the in-depth study of the facets for adopting pragmatic innovation approaches and solutions… Read More
Capture 1 ADACOM at 2nd Infocom Security Cyprus 2019 (5/6/2019) - For second year in a row, ADACOM participates as a Silver Sponsor at 2nd Infocom Security Cyprus 2019, 14th of May at Filoxenia Conference center, Nicosia "Next Generation Cyber Security" The Digital Transformation that takes place at all levels of our live, has been creating an ever-changing environment, where, among other things, characterize the new… Read More
infocom linkedinADACOM at Infocom Security Conference 2019 : Cyber Security in the Age of Industry 4.0 (4/8/2019) - ADACOM partners with RSA at Infocom Security Conference 2019, 17 & 18 April at Dais Conference Center, Maroussi. The basis for Cyber Security in the Age of Industry 4.0 is the combination of the natural and digital world. The interconnection of machines with information and communication systems and the complete digitization of physical procedures through… Read More
mdr2 e1549982126548ADACOM announces Managed Endpoint Detection and Response Services (MDR). (2/12/2019) - ADACOM announces Managed Endpoint Detection and Response Services (MDR). This unique service will fill the need of organizations of all sizes that want to expand their capability beyond typical preventative technologies and augment their detection, response and 24x7 monitoring gaps without investing in internal security expertise. Our MDR service, set up in hours without installing… Read More
cyberattacksCyber attacks as likely as natural disasters, as devastating as ecosystem collapse: WEF (1/21/2019) - Data fraud, cyber attacks, and critical information infrastructure breakdown flagged among 2019’s most significant causative risks Cyber attacks will have a similar global impact to water crises this year and are nearly as likely as natural disasters, the World Economic Forum (WEF) has warned in an analysis of societal risks that underscores that critical importance… Read More
Case Study: Data Loss Prevention for the GDPR requirements of a Global Financial Institution in Switzerland (12/11/2018) - Case Study ADACOM Summary The client is one of UK’s leading Financial Institutions, with more than 4.755 branches in 55 countries in Europe, Asia, Africa and America and 1.600 branches in the UK. The company must be diligent in protecting against all kind of cyber-attacks that originate from both internal and external threats and offer… Read More
eidastrainingADACOM participates in “eIDAS Training” & “eIDAS for SMEs Workshop” 2018 (11/30/2018) - Complete electronic means of identification and authentication are rapidly improving the way companies can offer services to customers digitally. Therefore, ADACOM empowers and motivates its employees with continued training, that enhance personal growth, knowledge and education in a rapidly growing environment. The eIDAS Regulation has set the basis for creating a strong digital identity framework,… Read More
engagement typesThe Vulnerability Landscape of Greece (11/20/2018) - The Vulnerability Landscape of Greece Report is a technical report compiled by ADACOM Cyber Security, which includes the major problems of Greek organizations. The current report contains a statistical analysis of the security findings discovered by ADACOM during a period of three years and a sample of 200 security engagements of various types. The findings… Read More
adacom partner logo fireye e1513163678269“Cyber Attack Simulation Exercise”, Adacom & FireEye (10/11/2018) - ADACOM and FireEye organised, a “Cyber Attack Simulation Exercise” on October 10th, 2018. The event was held at “The Cube Athens” and was mostly an interactive real-time cyber exercise simulation conducted by the experts. This exercise considered an incident scenario, where the participants chose and voted possible options, which were later analysed in detail by… Read More
37230147 637761886622743 8989362977115209728 oADACOM: Diamond Sponsor of the Hellenic Cyber Security Team 2018! (9/20/2018) -   ADACOM: Diamond Sponsor of the Hellenic Cyber Security Team 2018!   For second year in a row ADACOM sponsors the Hellenic Cyber Security Team in the European Cyber Security challenge, which will take place in London on 14-17 October 2018. The European Cyber Security Challenge is an initiative of the European Union Agency for Network… Read More