Events

Events

Events News Reportage Promotions

Kubernetes Security in 2025: Best Practices Backed by Real-World Attack...

Softprom, as an official distributor of Cymulate, brings you cutting-edge research into one of the most critical areas of cloud-native security today:... read more

21.05.2025

Welcome to Softprom Cybercafé – your 24/7 Gateway to Cybersecurity Expertise....

Join our on-demand library and enter the Softprom Cybercafé – an exclusive, always-on knowledge hub designed for IT professionals, security leaders, and... Register

19.05.2025 - 31.12.2025

LiveAction - Overcoming the Top 5 Challenges in Network Observability

In today’s digital-first world, the performance and reliability of enterprise networks are more critical than ever—especially for organizations in sectors... read more

19.05.2025

20% Off All Bentley Software: Celebrate Engineering Week!

For just five days — from May 19 to 23, 2025 — get 20% off all Bentley software products. A promo code is available upon request. read more

16.05.2025

24/06 [Webinar] SGBox Unifies SIEM and SOAR Capabilities for fast and...

SGBox is a versatile SIEM and SOAR-class solution with a modular and scalable architecture, designed to reliably protect IT systems against modern cyber... Register

24.06.2025 - 24.06.2025

Syteca - Shadow IT: What It Is, Why It Matters, and How to Protect Your...

In today’s hybrid and cloud-first workplaces, employees often use third-party tools and services to boost productivity, speed up collaboration, or simply... read more

16.05.2025

21/05 Sоftprom Small Talks. Beyond Construction: SYNCHRO in Action

Discover innovative uses of SYNCHRO 4D beyond traditional construction. On May 21, Softprom hosts a live discussion with Flo-Mech Ltd's Technical Director... Register

21.05.2025 - 21.05.2025

Vulnerability Management vs. Penetration Testing vs. Breach and Attack...

Explore the key differences between Vulnerability Management, Penetration Testing, and Breach and Attack Simulation. Learn how Cymulate, ImmuniWeb, Bugcrowd,... read more

09.05.2025

Softprom Brings Next-Gen Threat Intelligence to Eastern and Central Europe...

Softprom, a leading Value-Added IT Distributor, has signed an agreement with HackNotice, a leading dark web threat intelligence platform that empowers... read more

09.05.2025

Cymulate | Why Threat Exposure Validation Is Essential for Cybersecurity...

Cyber threats in 2025 are evolving faster than ever — more frequent, more sophisticated, and increasingly automated. In this dynamic threat landscape,... read more

02.05.2025

How GitLab Duo Helps Developers: AI Features in GitLab and Their Impact...

Learn how GitLab Duo integrates AI into software development. Overview of key features, team benefits, and opportunities from GitLab's official partner,... read more

29.04.2025

How CISOs Can Protect Their Business with Next-Gen Cybersecurity Solutions:...

For CISOs and IT security leaders, defending the organization isn’t just about prevention—it’s about building an intelligent, responsive, scalable cybersecurity... read more

23.04.2025

Softprom signs Distribution Agreement with LECS – Cyber Evolution to Strengthen...

Softprom, a leading Value-Added IT Distributor, is proud to announce the signing of a distribution agreement with LECS – Cyber Evolution, an innovative... read more

18.04.2025

BrandShield’s 2025 CyberScam Report: What Every CISO Needs to Know

Now in its second year, BrandShield’s 2025 CyberScam Report provides an in-depth look into major concerns facing CISOs today. Based on insights from 200... read more

18.04.2025

Turn the Tables on Cyber Threats with Acalvio’s Preemptive Cybersecurity...

In today’s rapidly evolving threat landscape, cyber attackers are smarter, faster, and more automated than ever. With AI in their arsenal, threat actors... read more

18.04.2025

Senhasegura is now Segura®!

Big news: senhasegura is now Segura. New name. New look. Same mission: to give you clarity, agility, and control. read more

17.04.2025

QR Phishing Attacks: The Hidden Threat in Plain Sight

The use of QR codes in modern phishing campaigns allows attackers to cleverly evade traditional email filters and security tools, turning what appears... read more

16.04.2025

Imperva Named a Leader in Forrester Wave: Web Application Firewall Solutions...

Forrester’s recognition of Imperva’s Cloud Web Application Firewall (Cloud WAF) reflects Imperva company’s strategic focus, advanced capabilities, and... read more

04.04.2025

Protect Your Network from Unauthorized Access: 6 Security Controls Every...

Unauthorized access remains one of the most urgent and costly cybersecurity challenges for modern organizations. Whether it’s a hacker using stolen credentials... read more

04.04.2025

PLAXIS 3D: Free Online Training for Geotechnical Engineers

Bentley Systems has introduced the free online course Getting Started with PLAXIS 3D. It's an excellent opportunity to familiarize yourself with the program's... read more

04.04.2025

Protecting Financial Services from Online Threats: Why Brand Protection...

The financial services industry is one of the most targeted sectors for cybercrime. Banks, payment platforms, and fintech companies handle vast amounts... read more

02.04.2025