Hardware Assets as Ransomware Vehicles
Bentsi Ben-Atar, CMO of Sepio, discusses how hardware assets act as ransomware vehicles, bypassing defenses and compromising security.
Hardware Assets as Ransomware Vehicles
Bentsi Ben-Atar, CMO of Sepio, discusses how hardware assets act as ransomware vehicles, bypassing defenses and compromising security.
What is Shadow IT? The Hidden Network Security Risks
Shadow IT assets refers to the use of information technology systems without explicit approval from the IT department or management.
Captain RDM – Episode #23 – Promotion
Captain RDM demonstrated the best Rogue Device Mitigation capabilities and is being promoted to Major HAC-1!
Hardware Asset Visibility
Improve security with Hardware Asset Visibility. Track devices, verify identities, and enforce policies in a zero trust network.
To have full control of your assets, you need visibility down to the physical layer; layer one, making sure that no asset goes undetected.
Hardware Cybersecurity: Defending Physical Assets
Hardware Cybersecurity Platform – Protect Your Networks – Sepio
i24 – When Hackers Go Hardware
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Printer Hacked
Did you think that this only happens in the movies? Think again.
Cybersecurity Predictions
Cybersecurity Predictions are always challenging due to the evolving nature of technology and threats. However, here are some trends.
Challenges in Enforcing Hardware Security for IIoT and IoMT
Jessica Amado, Head of Cyber Research at Sepio presented the challenges in enforcing hardware security for IIoT and IoMT.
Hardware Security Measures
Discover key hardware security measures as Sepio’s Bentsi Benatar explores OSINT challenges in preventing hardware-based attacks.
Captain RDM – Episode #22 – Don’t Get Sick
An attacker disguised as a sick patient waits for the perfect moment to carry out a USB Rubber Ducky attack when least expected. Embracing Zero Trust Hardware Access could make the difference when lives are at stake…
Rubber Ducky Attack: The Evil Patient
A rubber ducky attack is a type of cyber attack that involves using a specially crafted USB device to exploit a computer system’s security.