Learn how Zero Trust Hardware Access is the missing piece of the puzzle in achieving a complete Zero Trust environment.
Learn how Zero Trust Hardware Access is the missing piece of the puzzle in achieving a complete Zero Trust environment.
In 2018, when exposed that unauthorized cybercriminals had been accessing millions of Starwood’s guests’ data since 2014, Marriott had to bear the brunt of the breach. Why? Marriott acquired Starwood back in 2016, and while this meant inheriting more hotels, it also meant inheriting Starwood’s cyber risks. So, despite the attack being initiated two years…
Terry Grafenstine, Global Chief Auditor, Technology at Citi, discusses her background in cybersecurity, supply chain threats, hardware security, and more.
Zero Trust Hardware Access is the missing piece of the puzzle in achieving a complete Zero Trust environment.
Join us for an insightful virtual event in which Jessica Amado will be speaking about Zero Trust Hardware Access-protection at the Physical Layer.
This guest needs no introduction. Watch Captain RDM’s first interview!
A manipulated peripheral was discovered in air-gapped environment-a Microsoft mouse had a Raspberry Pi module hidden inside…
Our next guest on our series, “Interviews with Cyber Security Experts”, needs no introduction. Stay tuned for Captain RDM’s first interview!
Lane Bess discusses why Zero Trust is so essential for today’s threat landscape, how Sepio’s HAC-1 solution enables Zero Trust, and more.