COMPUTER 2000 Bulgaria
Cybersecurity Maturity: Basic Principles, Building Blocks and Models

Cybersecurity Maturity: Basic Principles, Building Blocks and Models

Today’s attackers aren’t pulling any punches when it comes to persecuting our networks. For years, it hasn’t been a matter of “if” but “when” a cyberattack will occur. They look for any weakness, any hole in our defenses.  Now is the time to assess your cybersecurity...
What is a Whaling Attack and How to Protect your Organization

What is a Whaling Attack and How to Protect your Organization

What is Whaling in CyberSecurity? Imagine a vast ocean of cybersecurity, overflowing with different types of cybersecurity attacks and threats of all sizes. In these digital waters, there are a few who stand out – the “whales” of the corporate world. Whaling attacks...
Automation and AI – the Powerful Duo in Cybersecurity

Automation and AI – the Powerful Duo in Cybersecurity

What’s the first thing that comes to mind when you hear the words “security automation”? For many people in the cybersecurity industry, the idea of security automation is synonymous with automated response. But the truth is, automating response actions is only half of...
Dictionary Attacks: How They Decode Passwords

Dictionary Attacks: How They Decode Passwords

In the ever-evolving world of cybersecurity, understanding the tactics employed by malicious actors is crucial. In this blog, we delve into the world of dictionary attacks, and the mechanics behind these password-cracking techniques, shedding light on how they...
Trellix 2024 Cybersecurity Threat Predictions

Trellix 2024 Cybersecurity Threat Predictions

The Trellix team put together an article outlining their predictions about the cybersecurity threats in 2024. What does the near future hold? Introduction This last year we have seen upheaval across the cybersecurity landscape. The need for effective, worldwide threat...
Key Takeaways from Fortra’s 2023 Domain Impersonation Report

Key Takeaways from Fortra’s 2023 Domain Impersonation Report

Domain impersonation is one of the easiest, most common ways that cybercriminals trick us. As the name suggests, domain impersonation is when a threat actor mimics a legitimate site with a spoof site of the same name, or one very similar. In this blog article by...
Generative AI Could Worsen Cyber-Threats, Report Warns

Generative AI Could Worsen Cyber-Threats, Report Warns

A recent UK government report warns that generative AI could increase the risk of cyber-attacks and erode trust in online content by 2025. The tech could even help plan biological or chemical attacks by terrorists, it says. In his article, Chris Vallance, technology...
Financial Services Cybersecurity: What You Need to Know

Financial Services Cybersecurity: What You Need to Know

Cybercriminals go where the money goes, and the obvious choice is the financial industry. Numbers would agree; the Verizon 2023 Data Breach Investigations Report states that 95% of cyberattacks are financially driven. It’s no wonder the financial services sector is...