Watch for Cybersecurity Games at the Tokyo Olympics
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.
Watch for Cybersecurity Games at the Tokyo Olympics
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.
Critical Infrastructure is Missing Something Critical
Critical infrastructure is missing something critical-hardware security. Without it, intangible attacks will continue to have tangible effects.
Protect Your Network from IoT Devices By Using Cortex XSOAR and Sepio Systems
Efficiently mitigate hardware threats and maximize your visibility with the integration between Cortex XSOAR and Sepio Systems!
Evil Maid Attack – Vacuum Hack
Evil Maid Attack – Weaponizing a harmless vacuum cleaner hiding within it a small Rogue Device such as a Raspberry Pi. It is a typical day at the office. You are sitting at your desk, working hard at whatever it is that you do. The cleaning lady is also doing her job nearby, but you…
Interview: Bentsi Ben Atar on the Danger of Hardware Based Attacks
Bentsi Benatar speaks about hardware-based attacks and how to prevent them.
Secure Your Servers and Network with Sepio’s Visibility, Policy Enforcement, and Rogue Device Mitigation Solutions
Sepio Systems named one of the top 10 coolest IoT security companies in 2021 that have been introducing innovative new features and capabilities into the space.
The 10 Coolest IoT Security Companies: The 2021 Internet Of Things 50
Sepio Systems named one of the top 10 coolest IoT security companies in 2021 that have been introducing innovative new features and capabilities into the space.
Are you a “Rebel” or a “Collector” CISO?
In today’s cyber security landscape, it’s all about how you measure up against other enterprises in your domain.
“Busting” 5 Hardware Security Myths
Hardware security is an often-neglected aspect of cybersecurity that is not allocated the same resources as application and software security.
Sepio’s Solution Available in the Microsoft Azure Marketplace
Sepio, the leader in Hardware Access Control announced the availability of its HAC-1 solution in the Microsoft Azure Marketplace, an online store that provides applications and services for use on Azure. Sepio customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined deployment and management. Sepio’s Hardware Access Control platform…
Sepio Hardware Access Control solution now available in the Microsoft Azure Marketplace
Microsoft Azure customers worldwide now gain access to Sepio’s HAC-1 solution to take advantage of the scalability, reliability, and agility of Microsoft Azure to drive application development and shape business strategies. ROCKVILLE, Md., March 10, 2021 /PRNewswire/ — Sepio, a leader in hardware access control (HAC), today announced the availability of its HAC-1 solution in the Microsoft Azure Marketplace,…
The WatchDog Monero cryptojacking operation
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage…