adacom loader
Please Wait

Resources

ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing image
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order image
The Geopolitical Cyber Chessboard: Navigating Cyber Threats in a Shifting World Order
Silver Award for IDIKA SA and ADACOM at Cyber Security Awards 2024 image
Silver Award for IDIKA SA and ADACOM at Cyber Security Awards 2024
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age image
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion image
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion
ADACOM Participated in the 40th Athens Marathon – the Authentic image
ADACOM Participated in the 40th Athens Marathon – the Authentic
The New and Improved e-SignIT Identity image
The New and Improved e-SignIT Identity
Red Alert for VPN image
Red Alert for VPN
Strong and Mutually Beneficial Partnership: ADACOM and DigiCert image
Strong and Mutually Beneficial Partnership: ADACOM and DigiCert
Organizations now recognize cybersecurity breach as a strategic risk image
Organizations now recognize cybersecurity breach as a strategic risk
ADACOM Attains Threat Protection Advanced Specialization image
ADACOM Attains Threat Protection Advanced Specialization
Re-certification by the Hellenic Telecommunications & Post Commission (EETT) image
Re-certification by the Hellenic Telecommunications & Post Commission (EETT)
NIS2: Strengthening Critical Infrastructures image
NIS2: Strengthening Critical Infrastructures
AI Investigation image
AI Investigation
Preparing for the Quantum Threats: A Strategic Approach to Quantum Computing image
Preparing for the Quantum Threats: A Strategic Approach to Quantum Computing
Poseidon Shield: Holistic Cybersecurity Framework for Shipping Companies by ADACOM image
Poseidon Shield: Holistic Cybersecurity Framework for Shipping Companies by ADACOM
Navigating the Digital Operational Resilience Act (DORA): A Comprehensive Guide image
Navigating the Digital Operational Resilience Act (DORA): A Comprehensive Guide
A safer and more digitally resilient Europe with NIS2 image
A safer and more digitally resilient Europe with NIS2
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense image
ADACOM and Microsoft Hosted a Business Roundtable on AI-Driven Cyber Defense
ADACOM Participates Successfully as an Exhibitor at the Annual Conference of the PSEAD image
ADACOM Participates Successfully as an Exhibitor at the Annual Conference of the PSEAD
ADACOM Partner of the Year 2024 by CyberArk image
ADACOM Partner of the Year 2024 by CyberArk
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA image
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA
Participation in the Roundtable on the New European NIS 2 Directive image
Participation in the Roundtable on the New European NIS 2 Directive
ADACOM at the 12th Information Security Conference image
ADACOM at the 12th Information Security Conference