Videos

Stop Supply Chain Invaders
The post Stop Supply Chain Invaders appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...
Symmetry Systems Shines as Finalist in Cloud Security Alliance Startup Pitchapalooza
https://youtu.be/VVHoUNwQc6k Missed the Cloud Security Alliance Startup Pitchapalooza? Watch the Recording Now! Earlier this year, in May 2024, the Cloud... The post Symmetry Systems Shines as Finalist in Cloud Security Alliance Startup ...
Talking DSPM: Episode 3 – Omkhar Arasaratnam
https://youtu.be/4mfe6QGSvlM 00:00:03Dr. Mohit Tiwari: Omkhar, it’s a pleasure to have you on this interview. 00:00:06Omkhar Arasaratnam:Thank you for inviting me.... The post Talking DSPM: Episode 3 – Omkhar Arasaratnam appeared first on ...
Talking DSPM: Episode 4 – Dr. Mohit Tiwari
I’m Mohit Tiwari. I’m one of the co-founders of Symmetry Systems, and the CEO. Symmetry was spun out of Spark... The post Talking DSPM: Episode 4 – Dr. Mohit Tiwari appeared first ...
Talking DSPM: Episode 2 – Cecil Pineda
https://youtu.be/SG1Rd3SY40I Q: Welcome, Cecil. Thank you for joining us today. To start, could you share a bit about your journey... The post Talking DSPM: Episode 2 – Cecil Pineda appeared first on ...
Talking DSPM: Episode 1 – Brian Castagna
https://www.youtube.com/watch?v=cGVh8tjCncg Q: Welcome Brian. We’re excited to have you join us and share your views on modern data+AI security. Can... The post Talking DSPM: Episode 1 – Brian Castagna appeared first on ...

Eclypsium CEO Yuriy Bulygin: Beware Compromised Firmware and Baseboard Management Controllers
The post Eclypsium CEO Yuriy Bulygin: Beware Compromised Firmware and Baseboard Management Controllers appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...

UEFI Firmware Exploit Evades EDR
As endpoint security tools improve, attackers target lower level firmware components to evade detection. This demo shows how malware targeting UEFI firmware, such as Black Lotus, can evade Windows device security features ...

Attacking an Internal Windows Medical Device from the Internet
This firmware attack scenario demonstrates the type of attacks seen in the wild and showcases how an attacker can target, implant, or even destroy an internal medical device from the Internet. The ...

Eclypsium Overview
An introduction to Eclypsium's supply chain security, zero trust and device integrity solutions. The post Eclypsium Overview appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...