Events

Events

Events News Reportage Promotions

Vulnerability Management vs. Penetration Testing vs. Breach and Attack...

Explore the key differences between Vulnerability Management, Penetration Testing, and Breach and Attack Simulation. Learn how Cymulate, ImmuniWeb, Bugcrowd,... read more

09.05.2025

Softprom Brings Next-Gen Threat Intelligence to Eastern and Central Europe...

Softprom, a leading Value-Added IT Distributor, has signed an agreement with HackNotice, a leading dark web threat intelligence platform that empowers... read more

09.05.2025

Syteca - Shadow IT: What It Is, Why It Matters, and How to Protect Your...

In today’s hybrid and cloud-first workplaces, employees often use third-party tools and services to boost productivity, speed up collaboration, or simply... read more

06.05.2025

Cymulate | Why Threat Exposure Validation Is Essential for Cybersecurity...

Cyber threats in 2025 are evolving faster than ever — more frequent, more sophisticated, and increasingly automated. In this dynamic threat landscape,... read more

02.05.2025

How GitLab Duo Helps Developers: AI Features in GitLab and Their Impact...

Learn how GitLab Duo integrates AI into software development. Overview of key features, team benefits, and opportunities from GitLab's official partner,... read more

29.04.2025

How CISOs Can Protect Their Business with Next-Gen Cybersecurity Solutions:...

For CISOs and IT security leaders, defending the organization isn’t just about prevention—it’s about building an intelligent, responsive, scalable cybersecurity... read more

23.04.2025

Softprom signs Distribution Agreement with LECS – Cyber Evolution to Strengthen...

Softprom, a leading Value-Added IT Distributor, is proud to announce the signing of a distribution agreement with LECS – Cyber Evolution, an innovative... read more

18.04.2025

BrandShield’s 2025 CyberScam Report: What Every CISO Needs to Know

Now in its second year, BrandShield’s 2025 CyberScam Report provides an in-depth look into major concerns facing CISOs today. Based on insights from 200... read more

18.04.2025

Turn the Tables on Cyber Threats with Acalvio’s Preemptive Cybersecurity...

In today’s rapidly evolving threat landscape, cyber attackers are smarter, faster, and more automated than ever. With AI in their arsenal, threat actors... read more

18.04.2025

Senhasegura is now Segura®!

Big news: senhasegura is now Segura. New name. New look. Same mission: to give you clarity, agility, and control. read more

17.04.2025

QR Phishing Attacks: The Hidden Threat in Plain Sight

The use of QR codes in modern phishing campaigns allows attackers to cleverly evade traditional email filters and security tools, turning what appears... read more

16.04.2025

Imperva Named a Leader in Forrester Wave: Web Application Firewall Solutions...

Forrester’s recognition of Imperva’s Cloud Web Application Firewall (Cloud WAF) reflects Imperva company’s strategic focus, advanced capabilities, and... read more

04.04.2025

Protect Your Network from Unauthorized Access: 6 Security Controls Every...

Unauthorized access remains one of the most urgent and costly cybersecurity challenges for modern organizations. Whether it’s a hacker using stolen credentials... read more

04.04.2025

PLAXIS 3D: Free Online Training for Geotechnical Engineers

Bentley Systems has introduced the free online course Getting Started with PLAXIS 3D. It's an excellent opportunity to familiarize yourself with the program's... read more

04.04.2025

Protecting Financial Services from Online Threats: Why Brand Protection...

The financial services industry is one of the most targeted sectors for cybercrime. Banks, payment platforms, and fintech companies handle vast amounts... read more

02.04.2025

Syteca - 10 Privileged Access Management Best Practices

Privileged access management (PAM) is the cornerstone of data security and operational efficiency. A well-structured PAM strategy not only reduces the... read more

31.03.2025

Acalvio Recognized as a Leader in Deception Technology by GigaOm for the...

Softprom is proud to announce that Acalvio has once again been named a leader in deception technology in the latest GigaOm Radar for Deception Technology... read more

24.03.2025

Automox Introduces Best-in-Class Reporting and Analytics

Automox is launching powerful new analytics capabilities to help your organization demonstrate IT value. Automox Analytics introduces best-in-class reporting... read more

21.03.2025

How CISOs Can Combat AI-Powered Scams in 2025

As artificial intelligence (AI) technology advances, so do the tactics of cybercriminals. Today, AI-powered scams are more sophisticated, scalable, and... read more

21.03.2025

Why only Phishing Simulations are not enough?

Phishing simulations are useful, but they’re not enough. At CybeReady, we take a holistic approach to security training, ensuring organizations stay truly... read more

17.03.2025

[Webinar recording] Infrastructure and data protection in the current...

We talk about trends and the best modern tools for defence against cyber threats, new standards and requirements. Live Demo. read more

15.03.2025