Events
Vulnerability Management vs. Penetration Testing vs. Breach and Attack...
Explore the key differences between Vulnerability Management, Penetration Testing, and Breach and Attack Simulation. Learn how Cymulate, ImmuniWeb, Bugcrowd,... read more
09.05.2025
Softprom Brings Next-Gen Threat Intelligence to Eastern and Central Europe...
Softprom, a leading Value-Added IT Distributor, has signed an agreement with HackNotice, a leading dark web threat intelligence platform that empowers... read more
09.05.2025
Syteca - Shadow IT: What It Is, Why It Matters, and How to Protect Your...
In today’s hybrid and cloud-first workplaces, employees often use third-party tools and services to boost productivity, speed up collaboration, or simply... read more
06.05.2025
Cymulate | Why Threat Exposure Validation Is Essential for Cybersecurity...
Cyber threats in 2025 are evolving faster than ever — more frequent, more sophisticated, and increasingly automated. In this dynamic threat landscape,... read more
02.05.2025
How GitLab Duo Helps Developers: AI Features in GitLab and Their Impact...
Learn how GitLab Duo integrates AI into software development. Overview of key features, team benefits, and opportunities from GitLab's official partner,... read more
29.04.2025
How CISOs Can Protect Their Business with Next-Gen Cybersecurity Solutions:...
For CISOs and IT security leaders, defending the organization isn’t just about prevention—it’s about building an intelligent, responsive, scalable cybersecurity... read more
23.04.2025
Softprom signs Distribution Agreement with LECS – Cyber Evolution to Strengthen...
Softprom, a leading Value-Added IT Distributor, is proud to announce the signing of a distribution agreement with LECS – Cyber Evolution, an innovative... read more
18.04.2025
BrandShield’s 2025 CyberScam Report: What Every CISO Needs to Know
Now in its second year, BrandShield’s 2025 CyberScam Report provides an in-depth look into major concerns facing CISOs today. Based on insights from 200... read more
18.04.2025
Turn the Tables on Cyber Threats with Acalvio’s Preemptive Cybersecurity...
In today’s rapidly evolving threat landscape, cyber attackers are smarter, faster, and more automated than ever. With AI in their arsenal, threat actors... read more
18.04.2025
Big news: senhasegura is now Segura. New name. New look. Same mission: to give you clarity, agility, and control. read more
17.04.2025
QR Phishing Attacks: The Hidden Threat in Plain Sight
The use of QR codes in modern phishing campaigns allows attackers to cleverly evade traditional email filters and security tools, turning what appears... read more
16.04.2025
Imperva Named a Leader in Forrester Wave: Web Application Firewall Solutions...
Forrester’s recognition of Imperva’s Cloud Web Application Firewall (Cloud WAF) reflects Imperva company’s strategic focus, advanced capabilities, and... read more
04.04.2025
Protect Your Network from Unauthorized Access: 6 Security Controls Every...
Unauthorized access remains one of the most urgent and costly cybersecurity challenges for modern organizations. Whether it’s a hacker using stolen credentials... read more
04.04.2025
PLAXIS 3D: Free Online Training for Geotechnical Engineers
Bentley Systems has introduced the free online course Getting Started with PLAXIS 3D. It's an excellent opportunity to familiarize yourself with the program's... read more
04.04.2025
Protecting Financial Services from Online Threats: Why Brand Protection...
The financial services industry is one of the most targeted sectors for cybercrime. Banks, payment platforms, and fintech companies handle vast amounts... read more
02.04.2025
Syteca - 10 Privileged Access Management Best Practices
Privileged access management (PAM) is the cornerstone of data security and operational efficiency. A well-structured PAM strategy not only reduces the... read more
31.03.2025
Acalvio Recognized as a Leader in Deception Technology by GigaOm for the...
Softprom is proud to announce that Acalvio has once again been named a leader in deception technology in the latest GigaOm Radar for Deception Technology... read more
24.03.2025
Automox Introduces Best-in-Class Reporting and Analytics
Automox is launching powerful new analytics capabilities to help your organization demonstrate IT value. Automox Analytics introduces best-in-class reporting... read more
21.03.2025
How CISOs Can Combat AI-Powered Scams in 2025
As artificial intelligence (AI) technology advances, so do the tactics of cybercriminals. Today, AI-powered scams are more sophisticated, scalable, and... read more
21.03.2025
Why only Phishing Simulations are not enough?
Phishing simulations are useful, but they’re not enough. At CybeReady, we take a holistic approach to security training, ensuring organizations stay truly... read more
17.03.2025
[Webinar recording] Infrastructure and data protection in the current...
We talk about trends and the best modern tools for defence against cyber threats, new standards and requirements. Live Demo. read more
15.03.2025