El HW como Instrumento para los Ataques Ransomware
Joaquin Ramos of Sepio speaks about hardware assets as ransomware vehicles.
El HW como Instrumento para los Ataques Ransomware
Joaquin Ramos of Sepio speaks about hardware assets as ransomware vehicles.
Hardware Assets as Ransomware Vehicles
Bentsi Ben-atar, CMO and Co-founder of Sepio speaks about hardware assets as ransomware vehicles.
What is Shadow IT?
Shadow IT assets refers to the use of information technology systems without explicit approval from the IT department or management.
Captain RDM – Episode #23 – Promotion
Captain RDM demonstrated the best Rogue Device Mitigation capabilities and is being promoted to Major HAC-1!
Hardware Asset Visibility
Improve security with Hardware Asset Visibility. Track devices, verify identities, and enforce policies in a zero trust network.
To have full control of your assets, you need visibility down to the physical layer; layer one, making sure that no asset goes undetected.
i24 – When Hackers Go Hardware
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Printer Hacked
Did you think that this only happens in the movies? Think again.
Is Zero Trust the Answer to a Healthy Healthcare Industry?
Healthcare is one of the most targeted industries for cyberattacks. Specifically, healthcare delivery organizations (HDOs) are the top target for data breaches, accounting for 73% of all such incidents. Ransomware is another type of attack the healthcare sector frequently falls victim to, impacting more than 30% of HDOs in the last year.
Security of Connected Medical Devices
When integrated with Layer 1 visibility, existing solutions such as NAC, EPS, SIEM and SOAR, are put to better use, and the organization achieves a stronger security posture.
Captain RDM – Episode #22 – Don’t Get Sick
An attacker disguised as a sick patient waits for the perfect moment to carry out a USB Rubber Ducky attack when least expected. Embracing Zero Trust Hardware Access could make the difference when lives are at stake…
Rubber Ducky Attack: The Evil Patient
A rubber ducky attack is a type of cyber attack that involves using a specially crafted USB device to exploit a computer system’s security.
Hardware Attacks on the NHS & Cyber Risks in Healthcare
Hardware in healthcare poses cybersecurity risks. Are you aware of these risks in UK healthcare? It is no secret that healthcare facilities hold important patient data. And, with the UK’s National Health Service (NHS) caring for over 1 million patients every 24 hours, one can only imagine the amount of data that one working day…