adacom loader
Please Wait

Resources

Unlocking NIS2 Compliance: Microsoft Security Solutions and ADACOM AI Driven XDR image
Unlocking NIS2 Compliance: Microsoft Security Solutions and ADACOM AI Driven XDR
Re-certification by the Hellenic Telecommunications & Post Commission (EETT) image
Re-certification by the Hellenic Telecommunications & Post Commission (EETT)
ADACOM as a Gold Sponsor in the 14th Infocom Security Conference & Expo image
ADACOM as a Gold Sponsor in the 14th Infocom Security Conference & Expo
Innovative Cybersecurity Solution - AI-Driven XDR image
Innovative Cybersecurity Solution - AI-Driven XDR
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing image
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order image
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order
ADACOM - Signatory of Women's Empowerment Principles (WPEs) image
ADACOM - Signatory of Women's Empowerment Principles (WPEs)
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025 image
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030 image
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center image
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center
Navigating NIS2 Playbook: From Legislation to Resilience image
Navigating NIS2 Playbook: From Legislation to Resilience
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
Digital Resilience: A Vital Strategy for Protecting Organizations Against Modern Threats image
Digital Resilience: A Vital Strategy for Protecting Organizations Against Modern Threats
Beyond Compliance: Leverage DORA for Competitive Advantage image
Beyond Compliance: Leverage DORA for Competitive Advantage
AI-Driven DataGuard: Επαναπροσδιορίζοντας την Προστασία Δεδομένων  image
AI-Driven DataGuard: Επαναπροσδιορίζοντας την Προστασία Δεδομένων 
The Need for Strong Authentication (Human IDs and Non-Human IDs) image
The Need for Strong Authentication (Human IDs and Non-Human IDs)
Τάσεις & εξελίξεις στην Κυβερνοασφάλεια για το 2025: Καινοτομία, Προκλήσεις & Ευκαιρίες image
Τάσεις & εξελίξεις στην Κυβερνοασφάλεια για το 2025: Καινοτομία, Προκλήσεις & Ευκαιρίες
NIS2 and Critical Infrastructure: What Business Leaders Need to Know image
NIS2 and Critical Infrastructure: What Business Leaders Need to Know
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE” image
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE”