Microsoft has recently introduced a feature in Microsoft 365 Copilot called flex routing that affects EU and EFTA customers. The feature allows large language model inferencing to occur outside the EU Data Boundary during periods of peak demand, with the aim of...
The OT Challenge of NIS2: Why OT Require a Different Security Approach
Introduction Cybersecurity frameworks are often designed with modern IT infrastructures in mind, but industrial systems rarely operate under the same assumptions. As organizations across Europe prepare for NIS2 compliance, many are discovering that traditional...
Data Protection Incidents Related to the Supply Chain in 2025
January 28 is Data Protection Day. This is a good opportunity to briefly review one aspect of data protection: the risks inherent in supply chains. Many information security laws and standards explicitly identify supply chain risk as an area to be considered. Data...
Too many security rules? – How to make a lot of information security rules easy for users to accept
Brief introduction November 30 is Computer Security Day, which is a good opportunity to remember the regulations that form the administrative basis of security. Since the introduction of NIS2 Directive, organizations that were not previously required to do so must now...
AI Management System – Introducing Black Cell’s new offering for a secure, privacy-conscious and ethical AI usage
As artificial intelligence continues to reshape industries, the need for structured, secure, and compliant AI governance has never been greater. In response to this growing demand, Black Cell is proudly announcing the launch of its AI Management System (AIMS) GAP...
Introducing Black Cell’s New Advisory Service: Compliance for Critical Entities
Black Cell Compliance always strived to interlink cybersecurity controls with regulatory requirements to enable compliance with various control frameworks and legislative instruments. With the adoption of the CER Directive (EU 2022/2557) and its Hungarian...
Compliance challenges with Generative AI
Introduction Artificial Intelligence (hereinafter referred to as AI) is rapidly reshaping the cybersecurity landscape. As organizations strive to keep up with increasingly sophisticated cyber threats, they turn to AI to gain an edge. Yet this reliance on it brings new...
Threats of Thoughts: The Cybersecurity Vulnerabilities of Brain-Computer Interfaces
Introduction Brain-Computer Interfaces (BCIs) are rapidly evolving technologies that allow direct communication between the human brain and external devices. While they hold immense potential in medical applications - such as restoring mobility, communication, or...
World anti-SPAM Day
June 23 is World Anti-SPAM Day. On this occasion, this post highlights the most important current actualities in the field. Nowadays, most people are familiar with what SPAM is, and many encounter it regularly in their everyday lives. IT and information security are...










