Bentsi Ben-Atar of Sepio discusses cyber spy espionage attacks and how hardware attack tools are a real life threat and a common attack tool.
Schedule a Demo
Let us show you how Sepio’s HAC-1 can achieve 100% visibility, using Hardware layer (L1) as the new data source. Enabling policy enforcement and mitigation of ALL connected devices.
Schedule a Demo
PRODUCT
WHITEPAPERS
Managing Hardware Related Risks in Healthcare
Managing hardware related Risks in healthcare is crucial due to the fact that lives are at stake.
Learn More
BY FRAMEWORK
Become a partner
Together with our partners, we build long-term strategies to serve our customers with the best cybersecurity posture.
Learn More
PARTNERS AREA
RESEARCH
HACx Overview
The Hardware Access Control Index (HACx) developed by Sepio seeks to assess enterprises’ hardware security posture through objective indicators.
Learn More
EVENTS AND WEBINARS
RESEARCH
Understanding Zero Trust Hardware Access
Zero trust security is an important concept in cybersecurity but has not been examined thoroughly in the context of underlying hardware platforms.
Learn More
POSTS
RESEARCH
Understanding Zero Trust Hardware Access
Zero trust security is an important concept in cybersecurity but has not been examined thoroughly in the context of underlying hardware platforms.
Learn More
PEOPLE AT SEPIO
Schedule a Demo
Let us show you how Sepio’s HAC-1 can achieve 100% visibility, using Hardware layer (L1) as the new data source. Enabling policy enforcement and mitigation of ALL connected devices.
Schedule a Demo
PRODUCT
WHITEPAPERS
Managing Hardware Related Risks in Healthcare
Managing hardware related Risks in healthcare is crucial due to the fact that lives are at stake.
Learn More
BY FRAMEWORK
Become a partner
Together with our partners, we build long-term strategies to serve our customers with the best cybersecurity posture.
Learn More
PARTNERS AREA
RESEARCH
HACx Overview
The Hardware Access Control Index (HACx) developed by Sepio seeks to assess enterprises’ hardware security posture through objective indicators.
Learn More
EVENTS AND WEBINARS
RESEARCH
Understanding Zero Trust Hardware Access
Zero trust security is an important concept in cybersecurity but has not been examined thoroughly in the context of underlying hardware platforms.
Learn More
POSTS
RESEARCH
Understanding Zero Trust Hardware Access
Zero trust security is an important concept in cybersecurity but has not been examined thoroughly in the context of underlying hardware platforms.
Learn More
PEOPLE AT SEPIO
Bentsi Ben-Atar of Sepio discusses cyber spy espionage attacks and how hardware attack tools are a real life threat and a common attack tool.
Joaquin Ramos of Sepio speaks about hardware assets as ransomware vehicles.
Bentsi Ben-atar, CMO and Co-founder of Sepio speaks about hardware assets as ransomware vehicles.
Hardware assets are all around us and in growing numbers – which indicates what an impossible task it is to track all of them, let alone apply a usage policy.
To have full control of your assets, you need visibility down to the physical layer; layer one, making sure that no asset goes undetected.
Captain RDM demonstrated the best Rogue Device Mitigation capabilities and is being promoted to Major HAC-1!
Hardware assets are all around us and in growing numbers – which indicates what an impossible task it is to track all of them, let alone apply a usage policy.
To have full control of your assets, you need visibility down to the physical layer; layer one, making sure that no asset goes undetected.
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Did you think that this only happens in the movies? Think again.
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
An attacker disguised as a sick patient waits for the perfect moment to carry out a USB Rubber Ducky attack when least expected. Embracing Zero Trust Hardware Access could make the difference when lives are at stake…
Are you aware of the hardware related risks in UK healthcare? It is no secret that healthcare facilities hold important patient data. And, with the UK’s National Health Service (NHS) caring for over 1 million patients every 24 hours, one can only imagine the amount of data that one working day can produce. Additionally, healthcare…
An ATM attack can be simple to carry out. A lack of Physical Layer visibility means-if a rogue device is inserted into an ATM, it raises no security alarms.
Healthcare facilities, specifically hospitals, often perform critical, life-saving operations. Technology has developed in a way that it now assists in these operations. And the introduction of the Internet of Medical Things (IoMT) has proven to be mission-critical. However, the reliance on a Wi-Fi connection has left the healthcare industry extremely vulnerable to Evil Twin attacks….
As doctors’ visits have stalled during the pandemic, connected medical devices filled the gap. Such tools include everyday devices like smartwatches and fitness trackers to complex medication trackers and biometric scanners, to name a few. The use of such devices has become so widespread that their global market value expects to rise to $60 billion…