Joaquin Ramos of Sepio speaks about hardware assets as ransomware vehicles.
Joaquin Ramos of Sepio speaks about hardware assets as ransomware vehicles.
Bentsi Ben-atar, CMO and Co-founder of Sepio speaks about hardware assets as ransomware vehicles.
Shadow IT refers to the use of information technology systems without explicit approval from the IT department or management.
Captain RDM demonstrated the best Rogue Device Mitigation capabilities and is being promoted to Major HAC-1!
Hardware assets are all around us and in growing numbers – which indicates what an impossible task it is to track all of them, let alone apply a usage policy.
To have full control of your assets, you need visibility down to the physical layer; layer one, making sure that no asset goes undetected.
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Did you think that this only happens in the movies? Think again.
Jessica Amado, Head of Cyber Research at Sepio presented the challenges in enforcing hardware security for IIoT and IoMT.
Jessica Amado speaks about the rise of ransomware attacks-how these attacks now have a physical impact and are no longer confined to the cyber space.
An attacker disguised as a sick patient waits for the perfect moment to carry out a USB Rubber Ducky attack when least expected. Embracing Zero Trust Hardware Access could make the difference when lives are at stake…
A rubber ducky attack is a type of cyber attack that involves using a specially crafted USB device to exploit a computer system’s security.
Tamir Pardo, Former Director of the MOSSAD discusses global threats that supply chain attacks pose, hardware security attack tools, and more!
Smart TV hacking refers to unauthorized access and manipulation of smart television systems, which are equipped with internet connectivity.
An employee working at Oui Work was hacked because he was using a rogue AP… Thankfully, Captain RDM came just in time to warn him, and put the bad guy behind bars.
Ransomware and physical world” is a scenario where ransomware cyber attacks, extends its impact to affect physical systems.