adacom loader
Please Wait

Resources

Securing Cloud Transformation: ADACOM, BlueStream & Microsoft image
Securing Cloud Transformation: ADACOM, BlueStream & Microsoft
IDEAL Holdings at ATHEX Tech Summit 2025: Driving Innovation, Security, and Digital Leadership image
IDEAL Holdings at ATHEX Tech Summit 2025: Driving Innovation, Security, and Digital Leadership
Navigating Cyber Threat Trends: Key Insights from Verizon’s 2025 DBIR image
Navigating Cyber Threat Trends: Key Insights from Verizon’s 2025 DBIR
Achieving Microsoft Specialization: Identity and Access Management (IAM) image
Achieving Microsoft Specialization: Identity and Access Management (IAM)
Exploring Identity Verification as a Standalone Qualified Trust Service image
Exploring Identity Verification as a Standalone Qualified Trust Service
Supporting Excellence and the Next Generation of Cybersecurity Talent image
Supporting Excellence and the Next Generation of Cybersecurity Talent
ADACOM - Signatory of Women's Empowerment Principles (WPEs) image
ADACOM - Signatory of Women's Empowerment Principles (WPEs)
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025 image
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030 image
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center image
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center
Navigating NIS2 Playbook: From Legislation to Resilience image
Navigating NIS2 Playbook: From Legislation to Resilience
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
How will NIS 2 Change Cybersecurity for Critical Infrastructure? image
How will NIS 2 Change Cybersecurity for Critical Infrastructure?
5+1 Benefits of a Managed SOC image
5+1 Benefits of a Managed SOC
PCI DSS 4.0 is here. Are you ready for the new security requirements? image
PCI DSS 4.0 is here. Are you ready for the new security requirements?
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE” image
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE”