Nowadays, mechanics run all their tests through a car diagnostic device. State-sponsored actors are exploiting all possible attack vectors, such as hardware based attacks.
Talk to an expert
Take the first steps to see, assess and manage your asset risk management. Get a custom demo from our experts.
Talk to an expert
PRODUCT
Sepio's Asset Risk Management (ARM)
Sepio platform sees, assesses, and mitigates all known and shadow assets at any scale.
Sepio Solution Breif
Become a partner
Together with our partners, we build long-term strategies to serve our customers with the best cybersecurity posture.
Become a partner
PARTNERS AREA
On Demand: From the CISO
HSBC’s CISO Monique Shivanandan and Carl Froggett, Citi's former CISO Infrastructure Defense, share their top trends and strategies for managing asset risk.
Watch now
EVENTS AND WEBINARS
Improving Asset Visibility and Vulnerability Detection on Federal Networks
Sepio has been awarded a contract to provide its Asset Risk Management (ARM) solution to CISA.
ARM on Federal Networks
POSTS
Join the Sepio team
Be part of our mission, and have an immediate impact on our solution and customers.
Join us
PEOPLE AT SEPIO
Nowadays, mechanics run all their tests through a car diagnostic device. State-sponsored actors are exploiting all possible attack vectors, such as hardware based attacks.
Learn how Sepio’s Hardware Access Control (HAC-1) solution can assist Federal agencies in achieving a comprehensive ZTA.
Will the next James Bond be a nerd? Reviewing the James Bond series over recent years, that seems to be the logical conclusion…
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Did you think that this only happens in the movies? Think again.
Healthcare is one of the most targeted industries for cyberattacks. Specifically, healthcare delivery organizations (HDOs) are the top target for data breaches, accounting for 73% of all such incidents. Ransomware is another type of attack the healthcare sector frequently falls victim to, impacting more than 30% of HDOs in the last year.
In late 2021, the British government introduced the Product Security and Telecommunications Infrastructure Bill. There are major IoT security issues, represented by the 100% increase in IoT breaches in just the first half of 2021. To change this, the bill seeks to apply security requirements on all manufacturers, importers and distributors.
Infamous cybercrime group, FIN7 hackers strike again, once again using BadUSB devices to target US companies.
With 2022 being just around the corner, it’s crucial to start thinking about which key cybersecurity trends to look out for. Below are 5 cybersecurity predictions for 2022: 1. Growing Popularity of Using Internal Abusers As cybersecurity products are getting a stronger grip on IT assets, the use of an internal abuser will become more…
Ransomware may seem like a straightforward concept… Yet, somehow, there are many misconceptions about ransomware.
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
Jessica Amado, Head of Cyber Research at Sepio presented the challenges in enforcing hardware security for IIoT and IoMT.
Jessica Amado speaks about the rise of ransomware attacks-how these attacks now have a physical impact and are no longer confined to the cyber space.
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |