Dec 1, 2025
Тя е правила рестарт няколко пъти и в личен, и в професионален план. Днес се стреми да подхожда по-осъзнато, по-мъдро и по-философски. Има докторантура по психолингвистика от СУ „Св. Климент Охридски“ и MBA по двуезична програма на Стопанския факултет на СУ и...
Nov 30, 2025
Is CVSS Alone Enough Today? CVSS (Common Vulnerability Scoring System) is a technical standard developed to provide a unified way to assess the severity of vulnerabilities. In theory, you just input several parameters and get a score from 0 to 10. It sounds simple —...
Nov 29, 2025
Threat Landscape Financial institutions remain among the most attractive targets for cybercriminals and state-sponsored actors due to the direct access to money, high-value data, and critical role in global economies. Threat actors frequently deploy phishing campaigns...
Nov 27, 2025
40% of global organisations could be hit by security breaches due to “shadow AI” by 2030, according to analyst firm Gartner. Shadow AI – the use of artificial intelligence tools by employees without a company’s approval and oversight – is...
Nov 19, 2025
What is Identity Posture and why should SMBs care? Identity Posture refers to how well your organization manages, protects, and monitors its identity-related assets – things like user accounts, credentials, and application access. In today’s cloud-first, hybrid...
This website use cookies to ensure you get the best experience. More info in our cookie policy/privacy policy.ACCEPTCOOKIE POLICY