Events

Events

Events News Reportage Promotions

Inside AWS Security Agent: Multi-Agent Architecture for Automated Penetration...

Discover how AWS Security Agent uses a multi-agent AI architecture to automate penetration testing, enabling faster vulnerability detection, intelligent... read more

06.03.2026

Dark Web Monitoring in 2026: Proactive Intelligence to Prevent Data Breaches...

Dark web activity often signals cyberattacks before they happen. Learn how BrandShield’s Dark Web Monitoring solution helps organizations detect leaked... read more

04.03.2026

12/03 Is Zero Trust Network Access enough? | Webinar

Are you aware about the ZTNA concept, limitations and improvements? Discover how Thales (Imperva) can enhance your ZTNA strategy by adding the missing... read more

03.03.2026

Softprom Announces Distribution Agreement with cPacket to Enhance Network...

Softprom has signed a distribution agreement with cPacket Networks Inc. to provide advanced packet-based network observability solutions. read more

02.03.2026

How Government Agencies Can Modernize Cybersecurity with Amazon Bedrock...

Learn how government agencies can enhance threat detection, automate incident response, and maintain regulatory compliance using agentic AI built on Amazon... read more

02.03.2026

Veracode 2026 report: The security debt crisis and high-risk vulnerability...

The Veracode 2026 State of Software Security (SoSS) report highlights a growing security debt crisis, with 82% of organizations affected. Learn about... read more

02.03.2026

Building Intelligent Event Agents with Amazon Bedrock AgentCore and Amazon...

Discover how organizations can rapidly deploy a secure, scalable, and production-ready AI event assistant using Amazon Bedrock AgentCore and Amazon Bedrock... read more

26.02.2026

Accelerate Storage Migration Planning with AWS Transform Assessments

AWS Transform assessments help organizations analyze compute and storage workloads, generate AI-driven TCO business cases, and accelerate cloud migration... read more

23.02.2026

Five key stages of building an effective privileged access management...

Discover how to build robust protection for critical assets using PAM systems. We review a step-by-step plan: from account inventory to implementing the... read more

18.02.2026

Sovereign Failover – Building Resilient Architectures with the AWS European...

Organizations operating across jurisdictions must be prepared for regulatory shifts, geopolitical disruptions, and sovereignty requirements that may impact... read more

18.02.2026

From Vulnerability Management to Continuous Threat Exposure Management:...

Traditional vulnerability management is no longer sufficient to address today’s dynamic and expanding attack surface. Organizations need a continuous,... read more

17.02.2026

Softprom Announces Distribution Agreement with NXLog to Expand Cybersecurity...

Softprom has signed a distribution agreement with NXLog, a global provider of high-performance log and telemetry pipeline management solutions. This partnership... read more

16.02.2026

Accelerating SaaS Migration Success with AWS: Programs, Tools, and Expertise...

As SaaS and AI reshape the global software market, Independent Software Vendors (ISVs) must modernize quickly to stay competitive. AWS provides proven... read more

16.02.2026

Eliminate Technical Debt with AWS Transform: Accelerating Migration and...

Technical debt slows innovation and increases IT costs. AWS Transform introduces agentic AI to automate and accelerate Windows modernization, mainframe... read more

12.02.2026

26/02 [Webinar] CybeReady: Automating security awareness to replace manual...

Learn how to automate employee training and effectively change staff behavior with CybeReady. Join our webinar on February 26th to see a live platform... Register

26.02.2026 - 26.02.2026

AWS Digital Sovereignty Well-Architected Lens: A Practical Framework for...

Amazon Web Services has introduced the Digital Sovereignty Well-Architected Lens to help organizations design, deploy, and operate cloud workloads that... read more

10.02.2026

Cost-Effective Brand Protection Strategies for 2026: How Businesses Can...

Brand protection is no longer a luxury reserved for large enterprises. In 2026, small and mid-sized businesses face growing risks from impersonation,... read more

09.02.2026

Softprom Signs Reseller Agreement with Anthropic to Deliver Enterprise...

Softprom has signed a Reseller Agreement with Anthropic, enabling enterprises in Eastern Europe, the Caucasus, and Central Asia to access Claude generative... read more

06.02.2026

Defending Against Autonomous AI Attacks in the Cloud

AI-orchestrated cyberattacks are compressing the time from initial access to full cloud compromise to just minutes. This article explains how autonomous... read more

05.02.2026

Beyond the Monolith: A Structured Approach to Database Modernization on...

Monolithic databases often limit scalability, performance, and innovation in modern cloud environments. This article explains how a structured database... read more

04.02.2026

How BlueCat Micetro 11.1 Enhances DHCP Management for Cisco Meraki SD-WAN...

How BlueCat Micetro 11.1 Enhances DHCBlueCat Micetro 11.1 extends the capabilities of Cisco Meraki SD-WAN by overcoming common DHCP management limitations... read more

03.02.2026