Events

Events

Events News Reportage Promotions

Stay Ahead of Network Issues with Real-Time Metrics in BlueCat Integrity...

BlueCat Integrity X provides always-on, real-time metrics for DNS, DHCP, and IP address management, enabling teams to detect performance, availability,... read more

17.04.2026

GenAI security: why business leaders must act now

Использование генеративного ИИ в бизнесе несет в себе скрытые риски утечки данных. Узнайте, как Teramind помогает контролировать использование GenAI и... read more

16.04.2026

Building AI Defenses at Scale with AWS: Proactive Security Before Threats...

AI is transforming how organizations protect cloud environments. AWS is already using AI to analyze trillions of events daily, reduce incident response... read more

16.04.2026

From awareness to action: why CybeReady is the missing link in identity...

Awareness of risks during Identity management day is not enough to prevent modern attacks. In this article, we explore why companies need practical cyber... read more

15.04.2026

IT Distributor = Technology Aggregator | 10 Partner Benefits — Softprom...

Why working with an IT distributor is more effective than going direct to a vendor. 10 key VAD benefits for European partners. Softprom's 120+ vendor... read more

14.04.2026

Redefining SOC Visibility in the age of infinite logs with GroundSOC |...

Explore a new approach to SOC data management architecture. If your SIEM is overwhelmed by log volumes and your costs are outscaling your security, this... read more

14.04.2026

Maximizing Cloud Value with AI Agents: Turning Intelligence into Business...

Many organizations invest in AI but fail to see measurable returns. Leaders who succeed combine modern AWS cloud infrastructure with agentic AI systems... read more

14.04.2026

20/05 [Webinar] How to Work with Complex Engineering Projects in CAD

Point clouds, 3D, AI, and Digital Twins: a practical overview of MicroStation and Bentley solutions for complex CAD projects. Register

20.05.2026 - 20.05.2026

How to Visualize Telemetry Data Flow and Volume with NXLog Platform

As telemetry pipelines grow in scale and complexity, even minor configuration changes can significantly affect data volume, processing efficiency, and... read more

09.04.2026

Amazon Web Services Frontier Agents: Autonomous Security Testing and Cloud...

AWS introduces a new class of autonomous AI systems—Frontier Agents—designed to independently execute complex security and operational tasks. With AWS... read more

06.04.2026

Transform Application Security with a Data-Driven Strategy from Veracode...

Modern development speed is outpacing traditional security practices, creating growing vulnerability backlogs and increasing software risk. A successful... read more

02.04.2026

Forrester Wave Q1 2026: Cloudflare, Akamai, and Amazon Web Services Shape...

The latest Forrester Wave™ report on Edge Development Platforms confirms a major market shift: edge is no longer an extension of CDN — it is becoming... read more

31.03.2026

True Data-Centricity: Why Data, Not Compute, Defines Modern IT Strategy...

For decades, IT strategies were built around compute—applications, servers, and workloads. Today, this paradigm is shifting. In the era of cloud and AI,... read more

30.03.2026

Agentic AI as the new insider threat: insights from Thales Data Threat...

An overview of key findings from the global data security study: why traditional protection methods fail in the age of agentic AI and how businesses are... read more

27.03.2026

GitLab: How a Unified DevSecOps Platform Works in Practice (Video)

See how GitLab brings planning, development, CI/CD, and security into a single platform — a short video overview of DevSecOps without tool fragmentation. ... read more

27.03.2026

Generate custom music in Google Vids, powered by Lyria 3 and Lyria 3 Pro...

You can now generate custom music in Google Vids, powered by Lyria 3 and Lyria 3 Pro, Google’s latest music generation model. read more

25.03.2026

Practical Digital Sovereignty on Amazon Web Services: Ensuring Compliance,...

Digital sovereignty has become a strategic priority for organizations operating in regulated industries. This article explores how to implement a practical... read more

25.03.2026

Accelerate Cloud Migration and Reduce Costs with AWS Transform and Generative...

Generative AI is transforming cloud migration by reducing timelines, costs, and complexity. With AWS Transform, organizations can automate discovery,... read more

23.03.2026

Automox Launches AEM for Zendesk: Endpoint Management Inside Your Support...

Automox launched the AEM app for Zendesk, enabling IT teams to view device status and remediate endpoint issues directly from support tickets without... read more

20.03.2026

Travel rewards become a new currency in the cybercriminal world: how Flare...

Cybercriminals are increasingly hunting for loyalty program points and frequent flyer miles, turning them into liquid assets in the Dark Web. Learn how... read more

18.03.2026

360 Deception: Redefining Cyber Defense in the Age of AI-Driven Attacks...

AI-driven attacks are not just faster—they fundamentally challenge traditional security models built on trust and anomaly detection. Discover how Acalvio’s... read more

18.03.2026