adacom loader
Please Wait

Resources

ADACOM at 13th Infocom Security Conference & Expo 2023 image
ADACOM at 13th Infocom Security Conference & Expo 2023
IDEAL Holdings: A Diversified Portfolio of Ideal Investments for Innovational Investors image
IDEAL Holdings: A Diversified Portfolio of Ideal Investments for Innovational Investors
“The trusted companion on the path of digital change and the value of Cybersecurity” image
“The trusted companion on the path of digital change and the value of Cybersecurity”
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
Double Gold Award for ADACOM at Cyber Security Awards 2023 image
Double Gold Award for ADACOM at Cyber Security Awards 2023
ADACOM Qualified e-Signatures (QES) services integrated with ADOBE Acrobat Sign image
ADACOM Qualified e-Signatures (QES) services integrated with ADOBE Acrobat Sign
Achieving Microsoft Specialization: Identity and Access Management (IAM) image
Achieving Microsoft Specialization: Identity and Access Management (IAM)
Supporting Excellence and the Next Generation of Cybersecurity Talent image
Supporting Excellence and the Next Generation of Cybersecurity Talent
Cyber Fraud in Stock Markets: How to Protect Yourself– Insights by Panos Vassiliadis image
Cyber Fraud in Stock Markets: How to Protect Yourself– Insights by Panos Vassiliadis
Education and Multi-Layered Security: Altani Batoudaki Interview image
Education and Multi-Layered Security: Altani Batoudaki Interview
At the Forefront of Cybersecurity: Nikitas Kladakis Interview image
At the Forefront of Cybersecurity: Nikitas Kladakis Interview
The 25 Year Journey of ADACOM, Next Goals and the Future for Cybersecurity image
The 25 Year Journey of ADACOM, Next Goals and the Future for Cybersecurity
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
How will NIS 2 Change Cybersecurity for Critical Infrastructure? image
How will NIS 2 Change Cybersecurity for Critical Infrastructure?
5+1 Benefits of a Managed SOC image
5+1 Benefits of a Managed SOC
PCI DSS 4.0 is here. Are you ready for the new security requirements? image
PCI DSS 4.0 is here. Are you ready for the new security requirements?
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense image
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense
ADACOM Participates Successfully as an Exhibitor at the Annual Conference of the PSEAD image
ADACOM Participates Successfully as an Exhibitor at the Annual Conference of the PSEAD
ADACOM Partner of the Year 2024 by CyberArk image
ADACOM Partner of the Year 2024 by CyberArk
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA image
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA
Participation in the Roundtable on the New European NIS 2 Directive image
Participation in the Roundtable on the New European NIS 2 Directive
ADACOM at the 12th Information Security Conference image
ADACOM at the 12th Information Security Conference