adacom loader
Please Wait

Resources

Innovative Cybersecurity Solution - AI-Driven XDR image
Innovative Cybersecurity Solution - AI-Driven XDR
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing image
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order image
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order
Silver Award for IDIKA SA and ADACOM at Cyber Security Awards 2024 image
Silver Award for IDIKA SA and ADACOM at Cyber Security Awards 2024
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age image
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion image
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion
Celebrating Success of ADACOM at Archer Summit 2023 image
Celebrating Success of ADACOM at Archer Summit 2023
Tailored Solutions for Every Organizational Need - Interview with Sofia Kanavou image
Tailored Solutions for Every Organizational Need - Interview with Sofia Kanavou
ADACOM's Commitment to Fostering a Thriving Workplace Culture image
ADACOM's Commitment to Fostering a Thriving Workplace Culture
IDEAL Holdings: A Diversified Portfolio of Ideal Investments for Innovational Investors image
IDEAL Holdings: A Diversified Portfolio of Ideal Investments for Innovational Investors
ADACOM Qualified e-Signatures (QES) services integrated with ADOBE Acrobat Sign image
ADACOM Qualified e-Signatures (QES) services integrated with ADOBE Acrobat Sign
ADACOM’s Managed Security Services integrated with CheckPoint Technologies image
ADACOM’s Managed Security Services integrated with CheckPoint Technologies
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
How will NIS 2 Change Cybersecurity for Critical Infrastructure? image
How will NIS 2 Change Cybersecurity for Critical Infrastructure?
5+1 Benefits of a Managed SOC image
5+1 Benefits of a Managed SOC
ADACOM as Grand Sponsor at the 9th InsurTech Conference image
ADACOM as Grand Sponsor at the 9th InsurTech Conference
ADACOM x DigiCert Host Executive Roundtable on Post-Quantum Cryptography image
ADACOM x DigiCert Host Executive Roundtable on Post-Quantum Cryptography
ADACOM as Gold Sponsor at the 1st AUEB Alumni Conference image
ADACOM as Gold Sponsor at the 1st AUEB Alumni Conference
ADACOM Sponsors the 10th Privacy & Data Protection Conference image
ADACOM Sponsors the 10th Privacy & Data Protection Conference
ADACOM Awarded IBM Partner of the Year in Security image
ADACOM Awarded IBM Partner of the Year in Security
ADACOM Awarded “CyberSecurity Company of the Year” in Greece at the 27th InfoCom World image
ADACOM Awarded “CyberSecurity Company of the Year” in Greece at the 27th InfoCom World