Events
Agentic AI as the new insider threat: insights from Thales Data Threat...
An overview of key findings from the global data security study: why traditional protection methods fail in the age of agentic AI and how businesses are... read more
27.03.2026
GitLab: How a Unified DevSecOps Platform Works in Practice (Video)
See how GitLab brings planning, development, CI/CD, and security into a single platform — a short video overview of DevSecOps without tool fragmentation. ... read more
27.03.2026
Generate custom music in Google Vids, powered by Lyria 3 and Lyria 3 Pro...
You can now generate custom music in Google Vids, powered by Lyria 3 and Lyria 3 Pro, Google’s latest music generation model. read more
25.03.2026
Practical Digital Sovereignty on Amazon Web Services: Ensuring Compliance,...
Digital sovereignty has become a strategic priority for organizations operating in regulated industries. This article explores how to implement a practical... read more
25.03.2026
Accelerate Cloud Migration and Reduce Costs with AWS Transform and Generative...
Generative AI is transforming cloud migration by reducing timelines, costs, and complexity. With AWS Transform, organizations can automate discovery,... read more
23.03.2026
Automox Launches AEM for Zendesk: Endpoint Management Inside Your Support...
Automox launched the AEM app for Zendesk, enabling IT teams to view device status and remediate endpoint issues directly from support tickets without... read more
20.03.2026
Travel rewards become a new currency in the cybercriminal world: how Flare...
Cybercriminals are increasingly hunting for loyalty program points and frequent flyer miles, turning them into liquid assets in the Dark Web. Learn how... read more
18.03.2026
360 Deception: Redefining Cyber Defense in the Age of AI-Driven Attacks...
AI-driven attacks are not just faster—they fundamentally challenge traditional security models built on trust and anomaly detection. Discover how Acalvio’s... read more
18.03.2026
Optimize Cloud Costs and Automate Security Remediation with AMS Trusted...
Organizations using AWS often receive thousands of security and optimization recommendations but struggle to implement them due to limited resources and... read more
17.03.2026
The Hidden Price Tag of Cloud Architectures: Avoiding Risks with the AWS...
Cloud adoption offers scalability and innovation, but poorly designed architectures can introduce hidden costs related to security incidents, downtime,... read more
09.03.2026
Inside AWS Security Agent: Multi-Agent Architecture for Automated Penetration...
Discover how AWS Security Agent uses a multi-agent AI architecture to automate penetration testing, enabling faster vulnerability detection, intelligent... read more
06.03.2026
Dark Web Monitoring in 2026: Proactive Intelligence to Prevent Data Breaches...
Dark web activity often signals cyberattacks before they happen. Learn how BrandShield’s Dark Web Monitoring solution helps organizations detect leaked... read more
04.03.2026
12/03 Is Zero Trust Network Access enough? | Webinar
Are you aware about the ZTNA concept, limitations and improvements? Discover how Thales (Imperva) can enhance your ZTNA strategy by adding the missing... read more
03.03.2026
Softprom Announces Distribution Agreement with cPacket to Enhance Network...
Softprom has signed a distribution agreement with cPacket Networks Inc. to provide advanced packet-based network observability solutions. read more
02.03.2026
How Government Agencies Can Modernize Cybersecurity with Amazon Bedrock...
Learn how government agencies can enhance threat detection, automate incident response, and maintain regulatory compliance using agentic AI built on Amazon... read more
02.03.2026
Veracode 2026 report: The security debt crisis and high-risk vulnerability...
The Veracode 2026 State of Software Security (SoSS) report highlights a growing security debt crisis, with 82% of organizations affected. Learn about... read more
02.03.2026
Building Intelligent Event Agents with Amazon Bedrock AgentCore and Amazon...
Discover how organizations can rapidly deploy a secure, scalable, and production-ready AI event assistant using Amazon Bedrock AgentCore and Amazon Bedrock... read more
26.02.2026
Accelerate Storage Migration Planning with AWS Transform Assessments
AWS Transform assessments help organizations analyze compute and storage workloads, generate AI-driven TCO business cases, and accelerate cloud migration... read more
23.02.2026
Five key stages of building an effective privileged access management...
Discover how to build robust protection for critical assets using PAM systems. We review a step-by-step plan: from account inventory to implementing the... read more
18.02.2026
Sovereign Failover – Building Resilient Architectures with the AWS European...
Organizations operating across jurisdictions must be prepared for regulatory shifts, geopolitical disruptions, and sovereignty requirements that may impact... read more
18.02.2026
From Vulnerability Management to Continuous Threat Exposure Management:...
Traditional vulnerability management is no longer sufficient to address today’s dynamic and expanding attack surface. Organizations need a continuous,... read more
17.02.2026