Events

Events

Events News Reportage Promotions

Eliminate Technical Debt with AWS Transform: Accelerating Migration and...

Technical debt slows innovation and increases IT costs. AWS Transform introduces agentic AI to automate and accelerate Windows modernization, mainframe... read more

12.02.2026

26/02 [Webinar] CybeReady: Automating security awareness to replace manual...

Learn how to automate employee training and effectively change staff behavior with CybeReady. Join our webinar on February 26th to see a live platform... Register

26.02.2026 - 26.02.2026

AWS Digital Sovereignty Well-Architected Lens: A Practical Framework for...

Amazon Web Services has introduced the Digital Sovereignty Well-Architected Lens to help organizations design, deploy, and operate cloud workloads that... read more

10.02.2026

Cost-Effective Brand Protection Strategies for 2026: How Businesses Can...

Brand protection is no longer a luxury reserved for large enterprises. In 2026, small and mid-sized businesses face growing risks from impersonation,... read more

09.02.2026

Softprom Signs Reseller Agreement with Anthropic to Deliver Enterprise...

Softprom has signed a Reseller Agreement with Anthropic, enabling enterprises in Eastern Europe, the Caucasus, and Central Asia to access Claude generative... read more

06.02.2026

Defending Against Autonomous AI Attacks in the Cloud

AI-orchestrated cyberattacks are compressing the time from initial access to full cloud compromise to just minutes. This article explains how autonomous... read more

05.02.2026

Beyond the Monolith: A Structured Approach to Database Modernization on...

Monolithic databases often limit scalability, performance, and innovation in modern cloud environments. This article explains how a structured database... read more

04.02.2026

How BlueCat Micetro 11.1 Enhances DHCP Management for Cisco Meraki SD-WAN...

How BlueCat Micetro 11.1 Enhances DHCBlueCat Micetro 11.1 extends the capabilities of Cisco Meraki SD-WAN by overcoming common DHCP management limitations... read more

03.02.2026

NotebookLM in the Gemini App: Leveraging Grounded Intelligence for Business...

Stop searching, start asking. Discover how integrating NotebookLM as a source in Gemini enables precise, document-based AI analysis for your team. read more

02.02.2026

Seamlessly Modernize Mission-Critical Applications on AWS with Softprom...

Modernizing mission-critical applications on AWS enables organizations to improve scalability, resilience, security, and innovation speed. This article... read more

02.02.2026

45 Bridges in 15 Months: AECOM Saves $850,000 with Bentley Solutions

How MicroStation and ProjectWise unified 300 experts across 22 offices, delivering 45 bridges ahead of schedule and saving $850,000. read more

30.01.2026

How EPM stops privilege-based attacks

Learn how Endpoint Privilege Management (EPM) enables the implementation of the Principle of Least Privilege, blocks malware execution, and prevents lateral... read more

29.01.2026

Passkeys in Practice: Why the Security Benefits Far Outweigh the Risks

Passkeys are transforming digital authentication by replacing passwords with phishing-resistant, user-friendly FIDO credentials. While new technologies... read more

29.01.2026

When the Attacker Is AI: Preemptive Security for Cloud and AI Workloads...

As AI workloads become core enterprise assets, attackers are increasingly using autonomous AI agents to exploit cloud environments at machine speed. This... read more

27.01.2026

Accelerate Context-Aware Data Analysis and ML with AWS SageMaker Data...

Amazon SageMaker Data Agent enables data teams to accelerate analytics and machine learning workflows by providing an AI assistant that understands your... read more

26.01.2026

Is Your Fortress Real or Painted? Why Vulnerability Management, BAS, and...

Why are classic pentesting and vulnerability scanning no longer enough? We explore the Continuous Threat Exposure Management (CTEM) methodology and comprehensive... read more

21.01.2026

5 Ways to Know Your Organization Needs Zoom Workplace

Is your organization running at the edge of its capacity? Find out how Zoom Workplace can help and where risks begin. read more

16.01.2026

Softprom Becomes BlueCat Networks Distributor in EMEA, Uniting DDI Expertise...

Softprom announces a strategic partnership with BlueCat, a leader in DDI management. Following BlueCat's acquisition of LiveAction, this agreement enables... read more

15.01.2026

Transform AI Development with Advanced Amazon SageMaker AI Customization...

Amazon SageMaker AI introduces powerful new capabilities for model customization and large-scale training, enabling organizations to build highly differentiated... read more

15.01.2026

Top 5 cybersecurity trends for 2026: why identity is becoming the main...

Segura's analysis of key threats for 2026: from AI-powered attacks to the explosive growth of machine identities. Learn how to transform your PAM strategy... read more

14.01.2026

From CAD to Geospatial Analytics: How GIS is Transforming Design and Data...

Geographic Information Systems are rapidly evolving and becoming a key component for CAD, digital twins, and smart infrastructure. We explain what drives... read more

14.01.2026