Black Cell expands global reach with new UAE office

Black Cell expands global reach with new UAE office

We, at Black Cell, a cybersecurity consulting firm focusing on protecting critical infrastructures, are proud to announce the opening of our newest office in the United Arab Emirates. Operating under Black Cell FZCO, this local office will enable us to better serve...

read more
Black Cell attained Security Solutions Partner designation

Black Cell attained Security Solutions Partner designation

We are pleased to announce that we have earned a Solutions Partner designation in the Security solution area. By attaining the Security partner designation, our Cloud Security business unit demonstrates the breadth of capabilities in delivering customer success based...

read more
How Zero Trust Can Help

How Zero Trust Can Help

How Zero Trust Can Help   Over the past year, there have been a number of successful ransomware attacks that have made online security a hot topic across the globe. In fact, just recently it was reported that Advanced, a technology vendor that provides the...

read more
ChatGPT for Offensive and Defensive Cyber

ChatGPT for Offensive and Defensive Cyber

ChatGPT for Offensive and Defensive Cyber   There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article,...

read more
Forensic Pattern Of Life Analysis

Forensic Pattern Of Life Analysis

Forensic Pattern Of Life Analysis   Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance.  It’s all about the habits that people — suspects, persons of interest, crime victims, or those...

read more
Top 10 Cybersecurity Reports 2022

Top 10 Cybersecurity Reports 2022

Top 10 Cybersecurity Reports 2022 We have collected the most relevant cybersecurity reports of 2022 that are worth checking.   Crowdstrike 2022 Crowdstrike Global Threat Report ENISA (European Union Agency for Cybersecurity) ENISA Threat Landscape 2022 Forbes...

read more
Cybersquatting | Infographic

Cybersquatting | Infographic

Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com”    

read more

Pin It on Pinterest