Rogue Device attacks on ATM through internal abusers and supply chain
Rogue Device attacks on ATMs are on the rise.
The Project Manager Defensive Cyber Operations (PM-DCO) is hosting a “Cyber Talk” with SOSSEC members and interested companies for an Informational and Educational Briefing by Sepio Systems – Complete Visibility and Control of all Hardware Assets and Rogue Device Mitigation! Join us on March 4, 2021, at 1 pm EST.
The Data Security & Privacy Global Virtual Event will be taking place on March 16th – 17th.CISO Roundtable: Critical Infrastructure cyber attacks – data theft, operational disruption and other consequences. In this virtual event, Bentsi Ben-atar, CMO & Co-founder of Sepio Systems and Jessica Amado, Head of Cyber Research at Sepio Systems will be speaking….
Overview of Section 889 Section 889 is part of the National Defense Authorization Act (NDAA) for Fiscal Year 2019. The statute imposes new restrictions on the procurement of telecommunications equipment or services from certain companies, and their subsidiaries or affiliates, based on their ties to the Chinese government. In doing so, the regulation expanded the…
Join us next for a fascinating and essential webinar about Pharma’s challenge to understanding all its threat vectors. Chris Hart, Director of Cyber at CyLumena and former CISO of Life Technologies and CTO Cyber of Thermo Fisher, and Jay Smilyk, CRO of Sepio Systems, will be discussing the challenges faced within the pharmaceutical industry. Pharma…
Pharma Industry Challenges Amid COVID-19 Pandemic The pharmaceutical industry is one of the most vital industries in the world; discovering, developing, producing and marketing drugs and medication to help patients suffering from illnesses as minor as the common cold, to life threatening diseases such as cancer. Especially today, when COVID-19 is causing major global disruptions,…
Critical infrastructure is recognized by governments as the body of systems, networks and assets (be that physical or virtual). It is so essential that their continued operation is required to ensure the security of a given nation, its economy and the public’s health and/or safety. Essentially, these are assets that are crucial for the functioning…
Many times, enterprises’ IT and security teams struggle in providing complete and accurate visibility into their hardware assets. This is relevant especially in today’s extremely challenging IT/OT/IoT environment. This is due to the fact that often, there is a lack of visibility, which leads to a weakened policy enforcement of hardware access. This may result…