A 2022 global survey of cybersecurity decision makers in the financial services industry that highlights awareness of firmware exploits, future spending, and remediation...
Credit unions face increasingly sophisticated attacks. This study highlights the work of one of New Mexico’s largest credit unions — First Financial Credit Union...
NIST 1800-161 is the foundational guidance for securing all digital supply chains. In this Eclypsium white paper we show how securing device-level “core code”...
With the increase in firmware-focused threats, many cybersecurity teams are wondering why their VM tools can’t keep up. The bottom line? They were ever meant to. Here are...
The fastest and most effective path to securing device supply chains – the number one target of both nation states and criminal gangs – is by securing their embedded...
Learn how Zero Trust principles apply to enterprise IT devices and why these principles need to extend down to the base hardware of chips, processors and system components.
...
Learn how firmware security fits into this widely used framework that tracks and maps adversary actions.
Find out which tactics and techniques are leveraging firmware vulnerabilities...
Two intersecting trends — the recent firmware explosion and rampant ransomware — have caused havoc and made security teams question their previous strategies.
This...
As firmware-level threats continue to gain popularity in the wild, security teams need to understand how these threats work and the real-world risks they pose to an organization’s...
Every piece of information and communications technology (ICT) equipment in an organization today is an amalgamation of chips, components, and code from a convoluted chain...