adacom loader
Please Wait

Resources

Silver Award for IDIKA SA and ADACOM at Cyber Security Awards 2024 image
Silver Award for IDIKA SA and ADACOM at Cyber Security Awards 2024
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age image
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion image
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion
ADACOM Participated in the 40th Athens Marathon – the Authentic image
ADACOM Participated in the 40th Athens Marathon – the Authentic
ADACOM Sets New Standards in Cybersecurity Achieving Five Specializations image
ADACOM Sets New Standards in Cybersecurity Achieving Five Specializations
Celebrating Success of ADACOM at Archer Summit 2023 image
Celebrating Success of ADACOM at Archer Summit 2023
Strong and Mutually Beneficial Partnership: ADACOM and DigiCert image
Strong and Mutually Beneficial Partnership: ADACOM and DigiCert
Organizations now recognize cybersecurity breach as a strategic risk image
Organizations now recognize cybersecurity breach as a strategic risk
ADACOM Attains Threat Protection Advanced Specialization image
ADACOM Attains Threat Protection Advanced Specialization
Re-certification by the Hellenic Telecommunications & Post Commission (EETT) image
Re-certification by the Hellenic Telecommunications & Post Commission (EETT)
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing image
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing
ADACOM Participated in the 40th Athens Marathon – the Authentic image
ADACOM Participated in the 40th Athens Marathon – the Authentic
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
How will NIS 2 Change Cybersecurity for Critical Infrastructure? image
How will NIS 2 Change Cybersecurity for Critical Infrastructure?
ADACOM at 1st Cyber Intelligence Forum image
ADACOM at 1st Cyber Intelligence Forum
ADACOM and Fortinet as Grand Sponsor on 8th InsurTech Conference image
ADACOM and Fortinet as Grand Sponsor on 8th InsurTech Conference
Modernizing Enterprise Security: Advanced Data Protection and Governance image
Modernizing Enterprise Security: Advanced Data Protection and Governance
Cybersecurity Challenges at the 35th Annual GES2024 | Greek Economic Summit image
Cybersecurity Challenges at the 35th Annual GES2024 | Greek Economic Summit
Global Digital Trust: Highlights from Meeting with NEAC Vietnam and EETT image
Global Digital Trust: Highlights from Meeting with NEAC Vietnam and EETT
Level Up Security with ADACOM and Check Point image
Level Up Security with ADACOM and Check Point