Киберсигурността като част от бизнес стратегията

Киберсигурността като част от бизнес стратегията

Тя е правила рестарт няколко пъти и в личен, и в професионален план. Днес се стреми да подхожда по-осъзнато, по-мъдро и по-философски. Има докторантура по психолингвистика от СУ „Св. Климент Охридски“ и MBA по двуезична програма на Стопанския факултет на СУ и...
Why CVSS Creates a False Sense of Security

Why CVSS Creates a False Sense of Security

Is CVSS Alone Enough Today? CVSS (Common Vulnerability Scoring System) is a technical standard developed to provide a unified way to assess the severity of vulnerabilities. In theory, you just input several parameters and get a score from 0 to 10. It sounds simple —...
Threat Hunting Across Industry Sectors

Threat Hunting Across Industry Sectors

Threat Landscape Financial institutions remain among the most attractive targets for cybercriminals and state-sponsored actors due to the direct access to money, high-value data, and critical role in global economies. Threat actors frequently deploy phishing campaigns...
Shadow AI Security Breaches will hit 40% of all Companies by 2030

Shadow AI Security Breaches will hit 40% of all Companies by 2030

40% of global organisations could be hit by security breaches due to “shadow AI” by 2030, according to analyst firm Gartner. Shadow AI – the use of artificial intelligence tools by employees without a company’s approval and oversight – is...
Strengthening Your Identity Posture

Strengthening Your Identity Posture

What is Identity Posture and why should SMBs care? Identity Posture refers to how well your organization manages, protects, and monitors its identity-related assets – things like user accounts, credentials, and application access. In today’s cloud-first, hybrid...