Thriving in IT Security: Zsófia’s Black Cell Story
Why did you choose BlackCell? How did you decide you wanted to work here? I wanted to start my career in IT security in an environment where I could gain insight into multiple aspects of the field while continuously developing my skills. It was important for me to be...
The OT Challenge of NIS2: Why OT Require a Different Security Approach
Introduction Cybersecurity frameworks are often designed with modern IT infrastructures in mind, but industrial systems rarely operate under the same assumptions. As organizations across Europe prepare for NIS2 compliance, many are discovering that traditional...
Common Security Gaps We Find in Microsoft 365
We have run several assessments in multiple Microsoft 365 tenants and while every organization has unique needs, the gaps are consistent. Here are the most common security vulnerabilities identified in the initial assessment. Entra ID: Over-Privileged Admins: 80% of...
Introducing Sophos Workspace Protection
Easy, effective, and affordable protection for remote and hybrid workers without the cost and complexity of traditional cloud-delivered stacks. Sophos Workspace Protection is a newly launched security solution designed to help IT teams secure today’s hybrid and...
From Google Redirect to Credential Theft: A Multi-Stage Attack Analysis
Introduction Targeted attacks (APT) no longer threaten only government agencies and critical infrastructure – small and medium-sized businesses are increasingly facing sophisticated attack techniques. Job offer decoy documents, malware distributed through trusted...
Data Protection Incidents Related to the Supply Chain in 2025
January 28 is Data Protection Day. This is a good opportunity to briefly review one aspect of data protection: the risks inherent in supply chains. Many information security laws and standards explicitly identify supply chain risk as an area to be considered. Data...
Black Cell ESM accepted into the Tech Sovereignty Catalogue
Black Cell is proud to share that proprietary ESM (Enterprise Security Monitoring) platform has been officially accepted into the Tech Sovereignty Catalogue. This is an important recognition within the European technology landscape and a significant milestone for our...
Harden your UEFI configurations with Intune and Entra ID
Did you know Microsoft has teamed up with major enterprise OEMs like Dell and HP, to let you configure UEFI settings via the Intune agent? Managing UEFI settings, like enforcing Secure Boot, implementing DMA safeguards, deploying UEFI Updates and other platform...
Growing Together: Richard’s Black Cell Story
At Black Cell, our people are the core of our success - and their stories reflect the culture we’re proud to build every day. This month, we spotlight Richard, whose dedication, leadership, and passion for continuous development have made a significant impact on our...
