Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Talk to an expert
Take the first steps to see, assess and manage your asset risk management. Get a custom demo from our experts.
Talk to an expert
PRODUCT
Sepio's Asset Risk Management (ARM)
Sepio platform sees, assesses, and mitigates all known and shadow assets at any scale.
Sepio Solution Breif
Become a partner
Together with our partners, we build long-term strategies to serve our customers with the best cybersecurity posture.
Become a partner
PARTNERS AREA
On Demand: From the CISO
HSBC’s CISO Monique Shivanandan and Carl Froggett, Citi's former CISO Infrastructure Defense, share their top trends and strategies for managing asset risk.
Watch now
EVENTS AND WEBINARS
Improving Asset Visibility and Vulnerability Detection on Federal Networks
Sepio has been awarded a contract to provide its Asset Risk Management (ARM) solution to CISA.
ARM on Federal Networks
POSTS
Sepio Trust Center
At Sepio we are transparent about our Security Framework that ensures the security, compliance, and privacy of your data.
Sepio Trust Center
PEOPLE AT SEPIO
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Did you think that this only happens in the movies? Think again.
Healthcare is one of the most targeted industries for cyberattacks. Specifically, healthcare delivery organizations (HDOs) are the top target for data breaches, accounting for 73% of all such incidents. Ransomware is another type of attack the healthcare sector frequently falls victim to, impacting more than 30% of HDOs in the last year.
Cybersecurity predictions are always challenging due to the evolving nature of technology and threats. However, here are some trends and predictions that experts have been discussing: Growing Popularity of Using Internal Abusers As cybersecurity products are getting a stronger grip on IT assets, the use of an internal abuser will become more popular. This will…
Ransomware may seem like a straightforward concept… but there are misconceptions. Some Ransomware facts you need to know.
Airport cybersecurity is a critical aspect of ensuring air travel. Airports are complex making them susceptible to various cyber threats.
Jessica Amado, Head of Cyber Research at Sepio presented the challenges in enforcing hardware security for IIoT and IoMT.
Jessica Amado speaks about the rise of ransomware attacks-how these attacks now have a physical impact and are no longer confined to the cyber space.
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
An attacker disguised as a sick patient waits for the perfect moment to carry out a USB Rubber Ducky attack when least expected. Embracing Zero Trust Hardware Access could make the difference when lives are at stake…
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
Did you think that this only happens in the movies? Think again.
The CISO role is safeguarding an organization’s digital assets and ensuring business continuity in the face of cybersecurity threats.
Cybersecurity awareness is crucial in today’s digital age, where individuals and organizations face an increasing number of cyber threats.