CTOs on the Move

Black Cipher Security

www.blackcipher.com

 
Black Cipher is a cybersecurity and DFIR consulting firm that also provides managed security services. Founded in 2013, we entered the market with the vision of making truly effective cybersecurity products and services available to the SMB market that seemed to have no one to turn to for help. Our team consists of industry certified professionals trained and experienced in the areas of cybersecurity, digital forensics, incident response, regulatory compliance, law, data governance, data privacy, risk management, and private / corporate investigations. Blending our technical expertise, with a customer and business-centric approach has resulted in consistently meeting our clients needs yet ...
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

C3 Engineers

C3 Engineers is a Boston, MA-based company in the Computers and Electronics sector.

Lindy Computer Connection Technology

Lindy Computer Connection Technology is a Athens, AL-based company in the Computers and Electronics sector.

NEAR

NEAR is a decentralized storage and compute platform that is secure enough to manage high value assets like money or identity and performant enough to make them useful for everyday people, putting the power of the Open Web in their hands.

Redpoint Cyber

At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.

Bitcoin Oil

Oil. It takes millions of years to create and seconds to burn. It`s known as `black gold` and its use dates back to as early as 3000 BC, when Babylonians would use it as mortar in construction and to waterproof their boats. Oil is one of the foundations of the modern world, and today it`s the mortar of our entire economy. Here, we develop its fascinating history further and take OIL as “Optimally Improved Ledger“ to the next level by creating the world`s prime decentralized cryptocurrency based on Bitcoin`s blockchain technology.