CSO Magazine has named Acalvio’s ShadowPlex as one of the best security products of the year. CSO specifically cites Acalvio’s ease of use and “unlimited deception assets without constant overhead or maintenance” as value added features. You...
The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past...
This blog covers three main topics: Three Key Questions Needing Answers Within Three Minutes When You Suspect a Breach Using Deception and Endpoint Logs to Backtrack Command and Control Improving SOC Triage Workflow with Prevention Failure Detection An adversary has...
Deception is a rapidly growing market and within the expansive market are a plethora of vendors to choose from as you and your team find a vendor to fit your deception security needs. To help organizations find the right vendor for their infrastructure, companies can...
When you think threat hunting, what comes to mind? For most enterprise security staff, the answer is “Hmmm, not sure if that’s for me”. It’s true that threat hunting is a bit daunting: What goals am I going to achieve? What will I do if I actually find an adversary? Do I have the skills […]
What’s the biggest lesson from the SolarWinds fiasco? Just focusing security defenses on the most common means of penetrating an organization doesn’t cut it.