Data privacy in cybersecurity is an ever-growing topic. To put it in the words of our Legal Advisor and Privacy Consultant, Nevena Temelkova...
AMATAS effort to support the growing cybersecurity community in Bulgaria continues this year with the upcoming BSides International Information Security Conference...
AMATAS CISO, Ivan Vladikin, revealed a behind-the-scenes look at his cyber security career, with insights into how he approaches...
Our CISO, Ivan Vladikin, has 12+ years of experience in protecting the three most important pillars of information security ...
It used to be the case that chief information security officers (CISOs) seemed out of place in the boardroom. But if the last several years have shown us anything...
2023 has finally arrived and while cybersecurity experts all around may be hoping for a less tumultuous year...
What a dynamic year for the AMATAS team! We had a great vision and strategy for 2022 and worked hard to achieve our ambitious goals! This year we have further strengthened our connection with existing clients...
2022 was most certainly a challenging year for everyone within the cybersecurity sector. The digital space was highly affected by the war between Russia and Ukraine.
This year’s Verizon Data Breach Investigations Report (DBIR) has highlighted several important developments regarding the changes in security breaches and incidents over the last year.
Let's continue with our overview of the eight domains within which you could grow your cybersecurity career. To highlight once more, having this basic understanding of the different...
Cybersecurity Month may be over, but the war on cybercrime continues as the latest threats (e.g. social engineering, DDoS, ransomware attacks) endanger our digital space.
What does it take to work in security assessment vs network security? We have summarized the top 8 cybersecurity domains, that are both accepted by the community and offer loads...
AMATAS welcomed October with CISA's Cybersecurity Awareness Month. Let's look at some of the biggest causes of security breaches, focusing...
What are the most common types of cyber-attacks? Here are the other six cyber threats — complementing the first five reviewed in Part I — that we see affecting businesses from all venues across the world.
Understanding the cyber threat landscape, what a cyber-attack is, and how your organization may be vulnerable to attacks is the first step toward prevention. While there are many different types...
Learn more about the role from our exclusive 9-question interview with our Pentest Team Lead. Looking forward to your next cybersecurity career? Check out our open positions and apply.
We are above and beyond grateful for having the chance to support the cybersecurity community by sharing knowledge and experience during the industry events in 2022. Learn more about what's on...
How your different career backgrounds can help a cybersecurity organization grow? Here's our guide to launch your exciting journey in cybersecurity - an industry that's always adapting and growing.
Let's examine the benefits provided by a managed extended detection and response (MXDR) system and compare how this service differs from other...
MXDR can supplement in-house efforts but also provide solid security to companies that cannot maintain their own security operations. They take off the pressure from threat monitoring, detection, and response...
Careers in cybersecurity are not only rewarding but have a bright future ahead of them. Find out if cybersecurity this the right career path for you. Join our team and we will help you learn and grow.
Companies of all sizes — from SMBs to large corporations — are introducing cybersecurity training on a regular basis, after realizing the importance of preparing their staff to handle threats.
What is the best way to react, and is it possible to prepare, rather than wait for misfortune to strike? Those questions are at the heart of the difference between proactive and reactive...
"Years ago, someone had commented on the huge potential of digital money and highlighted that the problems we will be facing will be mostly digital"
Given the increase in numbers as well as in the type of attacks over the last two years, 2022 (and beyond) will see a tightening of security, developing greater business preparedness, and the introduction of more AI.
Cyber attacks are growing exponentially in number and complexity. They’re also affecting an ever broader spectrum of companies — and even small and medium businesses need to be...
Where does large-scale cybersecurity of major corporations start and where does it interfere with our personal feeling of safety? The biggest hacks of the year show that protecting the digital assets...
The digital world has transformed almost every aspect of our lives — delivering unseen connectivity, productivity, and entertainment. This has become even more relevant with the COVID-19...
By 2025, global cybercrime damages are predicted to cost as much as $10.5 trillion a year. Both the complexity as well as the volume of cyberattacks is increasing...
Cybersecurity Awareness Month isn't just another catchy campaign (like “International Coffee Day” or “World Star Wars Day”), it's rather a movement to promote both individuals'...
Since the beginning of the year, security researchers across leading organizations have identified multiple phishing campaigns, relying on the scare of people from the biological infection to spread virtual ones with varying malicious capabilities.