Black Cell enrolled in the Threat Protection Specialization by Microsoft
Black Cell has always been committed to providing cybersecurity solutions at the bleeding edge to our clients. Last week we attained a Solutions Partner designation by Microsoft in the Security solution area, as set forth in our blog post. Today, we are proud to...
Black Cell expands global reach with new UAE office
We, at Black Cell, a cybersecurity consulting firm focusing on protecting critical infrastructures, are proud to announce the opening of our newest office in the United Arab Emirates. Operating under Black Cell FZCO, this local office will enable us to better serve...
Black Cell attained Security Solutions Partner designation
We are pleased to announce that we have earned a Solutions Partner designation in the Security solution area. By attaining the Security partner designation, our Cloud Security business unit demonstrates the breadth of capabilities in delivering customer success based...
Hacking scandal of Hungarian KRÉTA public education administration system
As a member of the socially responsible professional community, Black Cell would like to raise awareness on best practices to improve an organization’s overall compliance posture with a case study from Hungary on the occasion of World Data Protection Day. On 7...
Top 10 Cybersecurity Reports 2022
Top 10 Cybersecurity Reports 2022 We have collected the most relevant cybersecurity reports of 2022 that are worth checking. Crowdstrike 2022 Crowdstrike Global Threat Report ENISA (European Union Agency for Cybersecurity) ENISA Threat Landscape 2022 Forbes...
Cybersquatting | Infographic
Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com” Related Posts
Growth of Cybercrime Costs | Infographic
Cybercrime will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. At a growth rate of 15 percent year over year — cybercrime represents the greatest transfer of economic wealth in history. Related...
Defend Against Malicious Actors’ Game Plan | Infographic
'Control System Defense: Know the Opponent' - published by the National Security Agency and the Cybersecurity & Infrastructure Security Agency - breaks down the steps malicious actors take to compromise critical infrastructure control systems so that you can...
The Biggest Corporate Hacks 2021 | Infographic
Related Posts