Black Cell Compliance always strived to interlink cybersecurity controls with regulatory requirements to enable compliance with various control frameworks and legislative instruments. With the adoption of the CER Directive (EU 2022/2557) and its Hungarian...
Compliance challenges with Generative AI
Introduction Artificial Intelligence (hereinafter referred to as AI) is rapidly reshaping the cybersecurity landscape. As organizations strive to keep up with increasingly sophisticated cyber threats, they turn to AI to gain an edge. Yet this reliance on it brings new...
Threats of Thoughts: The Cybersecurity Vulnerabilities of Brain-Computer Interfaces
Introduction Brain-Computer Interfaces (BCIs) are rapidly evolving technologies that allow direct communication between the human brain and external devices. While they hold immense potential in medical applications - such as restoring mobility, communication, or...
World anti-SPAM Day
June 23 is World Anti-SPAM Day. On this occasion, this post highlights the most important current actualities in the field. Nowadays, most people are familiar with what SPAM is, and many encounter it regularly in their everyday lives. IT and information security are...
NIS2 in Germany: What you need to know and where to start
The NIS2 Directive (Directive (EU) 2022/2555) significantly raises the bar for cybersecurity across the EU. In Germany, its implementation is set to take shape through the NIS2-Umsetzungs- und Cybersicherheitsstärkungsgesetz (NIS2UmsuCG). Although the legislative...
World Backup Day 2025: Why a Strong Backup Strategy is More Crucial Than Ever
Introduction 31 March is World Backup Day, and it is a good occasion to take a look at the current state of the organization’s backup system. The proper design of a backup system is a critical success factor for an organization to ensure the availability and,...
Top 10 Cybersecurity Trends in 2025
Cyber threats are evolving rapidly in 2025. Staying ahead requires a proactive approach to innovation, compliance, and resilience.
Do you know what data your organization processes and under what conditions?
Introduction Many organizations conduct IT security audits with external auditor organizations for various reasons. Some perform audits as part of the operation of a management system, while others do so to ensure legal compliance. Recently, the drive for compliance...
Cybersecurity vs Cyber Compliance Infographic
How Goals and Responsibilities Differ: Cybersecurity vs. Cyber Compliance Cybersecurity and cyber compliance are NOT interchangeable terms. Use this cheat sheet to master the four key responsibilities of each and protect your organization from costly fines. ...