adacom loader
Please Wait

Resources

ADACOM Attains Threat Protection Advanced Specialization image
ADACOM Attains Threat Protection Advanced Specialization
EUDI Wallet, the journey towards electronic identity and the associated challenges image
EUDI Wallet, the journey towards electronic identity and the associated challenges
Unlocking NIS2 Compliance: Microsoft Security Solutions and ADACOM AI Driven XDR image
Unlocking NIS2 Compliance: Microsoft Security Solutions and ADACOM AI Driven XDR
Re-certification by the Hellenic Telecommunications & Post Commission (EETT) image
Re-certification by the Hellenic Telecommunications & Post Commission (EETT)
ADACOM as a Gold Sponsor in the 14th Infocom Security Conference & Expo image
ADACOM as a Gold Sponsor in the 14th Infocom Security Conference & Expo
Innovative Cybersecurity Solution - AI-Driven XDR image
Innovative Cybersecurity Solution - AI-Driven XDR
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center image
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center
Navigating NIS2 Playbook: From Legislation to Resilience image
Navigating NIS2 Playbook: From Legislation to Resilience
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals image
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals
Achieving Microsoft Specialization: Identity and Access Management (IAM) image
Achieving Microsoft Specialization: Identity and Access Management (IAM)
Supporting Excellence and the Next Generation of Cybersecurity Talent image
Supporting Excellence and the Next Generation of Cybersecurity Talent
NIS2: Strengthening Critical Infrastructures image
NIS2: Strengthening Critical Infrastructures
AI Investigation image
AI Investigation
Preparing for the Quantum Threats: A Strategic Approach to Quantum Computing image
Preparing for the Quantum Threats: A Strategic Approach to Quantum Computing
Poseidon Shield: Holistic Cybersecurity Framework for Shipping Companies by ADACOM image
Poseidon Shield: Holistic Cybersecurity Framework for Shipping Companies by ADACOM
Navigating the Digital Operational Resilience Act (DORA): A Comprehensive Guide image
Navigating the Digital Operational Resilience Act (DORA): A Comprehensive Guide
A safer and more digitally resilient Europe with NIS2 image
A safer and more digitally resilient Europe with NIS2
Securing Cloud Transformation: ADACOM CYPRUS, BlueStream & Microsoft image
Securing Cloud Transformation: ADACOM CYPRUS, BlueStream & Microsoft
Securing Cloud Transformation: ADACOM, BlueStream & Microsoft image
Securing Cloud Transformation: ADACOM, BlueStream & Microsoft
IDEAL Holdings at ATHEX Tech Summit 2025: Driving Innovation, Security, and Digital Leadership image
IDEAL Holdings at ATHEX Tech Summit 2025: Driving Innovation, Security, and Digital Leadership
ADACOM as Gold Sponsor at VISION FOREX FORUM 2025  image
ADACOM as Gold Sponsor at VISION FOREX FORUM 2025 
ADACOM as Gold Sponsor at Infocom Security Conference 2025 image
ADACOM as Gold Sponsor at Infocom Security Conference 2025
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense image
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense