Our Blog
Read our most recent insights, analysis, and news related to the cybersecurity industry.
EU countries with cold reception to cyber defence strategy
EU defence ministers adopted on Tuesday (23. May) conclusions on cyber defence, pointing out the need to avoid duplications in the institutional architecture, and stating their
Forrester with prediction on 2023’s top cybersecurity threats: From generative AI to geopolitical tensions
Forrester’s Top Cybersecurity Threats in 2023 report (client access reqd.) provides a stark warning about the top cybersecurity threats this year, along with prescriptive advice to CISOs and
The Security Teams’ Strategy for Coping with Limited Resources
Dealing with limited resources can be a common challenge for security operations teams. Whether it’s due to budget constraints, staffing shortages, or other factors, security teams often need to be creative in finding ways to achieve more with less.
Over 80% of Identity Crimes Victims in 2022 Were Caught in a Scammer’s Net
The Identity Theft Resource Center (ITRC) has released its latest report on the most significant identity compromise incidents that consumers experienced in 2022. The report shows that the number of identity fraud cases
Safeguard Public Kiosks with Forcepoint RBI
Public kiosks are now a common feature in various locations such as airports, retail spaces, and medical facilities. They offer easy access to information and services, but they also increase the attack surface and are highly susceptible to cyber-attacks.
RID Hijacking: How Guests Become Admins
RID hijacking is a persistence technique used by adversaries who have compromised a Windows machine. It involves using the relative identifier (RID) of the local Administrator account
How Password Managers Help Meet Cybersecurity Requirements
In light of the growing number of cyberattacks, many organizations are turning to cyber insurance to alleviate liability and potential losses. However, obtaining such coverage may prove challenging. Insurance companies have updated their criteria
Compromise Assessment Guide: Benefits, Effectiveness and Tools
A Compromise Assessment is a technical review of your network aimed at identifying previously undetected vulnerabilities. The assessment covers a wide range of potential threats
As Networks Change, the Need for Edge Protection Grows
The network edge protection concept is all about protecting data that is stored and/or transported outside of an organization’s predetermined security boundaries. Data outside of these boundaries is exposed to potential vulnerabilities, making security measures essential.

Subscribe. Get Instant Access to News & Insights.
Enter your details to get subscribed for our flagship industry newsletter “The Cybersecurity Radar” and stay on top of the most recent and important insights and news.
Contact Us
Main: +359 2 439 2000
Information Security: +359 2 439 2009
software@computer2000.bg
63 Shipchenski Prohod Blvd, Sofia 1574, Bulgaria
Monday-Friday: 9am – 6pm
Send an Inquiry
Let’s walk through the journey of digital transformation together.