Hardware Hacking: Tools, Tips & Tricks for Total Domination

Join Paul Asadoorian for an eye-opening webinar exploring the meteoric growth of affordable hardware hacking devices, from the FlipperZero to ESP32-based platforms, and their implications for cybersecurity.  This session is a must ...

Top Firmware Attack Vectors: Supply Chain Security’s Missing Link

Firmware presents real threats to the enterprise, and an attack surface enticing to threat actors. Cyberattackers use firmware vulnerabilities to break in and achieve persistence inside target environments, leading to repeated data ...

2025 Threat Landscape Trends to Watch

What Type of Attacks Will We See in 2025? January 23, 2025Time: 1:00 pm ET | 10:00 am PTSpeaker: Paul Asadoorian, Principal Security Researcher Bootkits, network infrastructure attacks, and firmware vulnerabilities all ...

Shielding Your Network Devices: Proven Strategies to Defend Against Advanced Attack Threats

Network appliances such as VPNs, firewalls, load balancers, and routers must be connected to the open internet. They do not support EDR and have deep access to resources inside the perimeter. For ...

Securing the Foundation: The Critical Role of Hardware in Supply Chain Attacks

As enterprises increasingly focus on supply chain security, a critical yet often overlooked element remains: hardware security. Many organizations fail to address the risks associated with underlying hardware, either due to misconceptions or ...

Getting the Gist of CJIS – 5.9.5

What’s New in CJIS 5.9.5 as it Relates to Firmware Security? n the latest CJIS Security Policy, the FBI is now requiring that IT firmware be verified for integrity and monitored for ...

Eclypsium Product Roadmap

Join Eclypsium Product Manager, Joe Hopp, for an overview of new product updates and a preview of the features and solutions on the Eclypsium Supply Chain Security Platform roadmap. The post Eclypsium ...

Securing Network Appliances: New Technologies & Old Challenges

IIn the current era where many network appliances are built on Linux operating systems, strong and robust firmware security is a must. Historically, network devices struggled to implement everything securely. As a ...

Vendor Risk Management from the Inside Out

Join Eclysium CISO Allan Alford as he explains why external assessments and questionnaires are insufficient for vendors providing your IT infrastructure products. The post Vendor Risk Management from the Inside Out appeared ...

Protecting the Soft Underbelly of the Data Center

The CIS Controls list hardware asset management as the most important security control, but how many organizations keep track of the components that make up the servers in their datacenter? Components such ...