In today's blog post, we will be going over a tool that is a must-have in every security analyst's arsenal. Even if you won't use it every day, it is helpful to understand what malware signatures look like in the background. YARA is a powerful pattern-matching tool...
Travel Secure: Essential Cyber Tips for Your Journey
Stay Cyber-Safe While Traveling! Your cybersecurity shouldn't take a vacation when you do. Check out our latest infographic to protect your data on the go: Before You Go: Update your devices and back up important data. Public Transit: Keep your devices secure and...
Black Cell attained the Information Protection and Governance advanced specialization
In the age of AI, with the exponential growth of data and increasing data mobility, customers need expert guidance on implementing effective information protection solutions. They also need strategic insights to better manage and mitigate the risks associated with...
Tool Tip: How to create honey folders?
In today's blog post, we will be going over how to create honey folders with no additional tooling. Cyber Deception allows for the placement of traps with no business value, “normal” is defined as no interaction. Its value lies in being probed, attacked, or...