Recently, an interesting survey pointed out that malware attacks are going fileless. In some cases, this means even using an internal employee to help with the process. For example, the attack on the Bank of Bangladesh and you quickly realize that advanced attackers...
General Availability of Deception 2.0 Technology Enables Automated, Cost-Effective Distributed Deception at Scale from on-premises or from the Cloud Santa Clara, Calif., April 19, 2017 – Acalvio Technologies, an innovator in Advanced Threat Defense, today announced...
Honeypots. Just those three syllables are enough to cause instant nausea with a cyber security professional. Why? Honeypots are hard to operationalize into an effective, easy to use and consistent defense. But times are changing with the proliferation of deception...