EMA Research Report A Definitive Market guide to Deception Technology The use of deception technology to combat cyber attackers has steadily gained ground over the last several years, especially among a subset of IT security practitioners who have grown weary of the...
This webinar examined the current data threat detection landscape, and assessed how data threat protection can be used to aid organizations in their information security strategies. View the recorded webinar here –
Feb 24 – 28, 2020 | San Francisco, CA RSA Conference 2020 takes place February 24 – 28 in San Francisco! Visit us at North Expo, Booth # 4210, Moscone Center 747 Howard Street San Francisco, California 94103
January 27 – 31 | Barcelona, Spain Join Acalvio at Cisco Live, Cisco’s world-renowned annual customer and partner conference Pod number: PVL-07B (Partner Village) Fira Barcelona Fira Gran Via (North Access) C/ Foc, 37 08038 Barcelona,...
Previously, we covered understanding AD Attack Surface and AD Attack Paths on this Active Directory Protection blog series. This post looks at Acalvio’s novel approach to protecting Active Directory against advanced persistent threats. It presents a critical attack surface that needs continuous monitoring for misconfigurations, vulnerabilities, and attack persistence. Alternative solutions attempt to protect AD […]
In a previous blog, we provided an overview of the (unfortunately quite complex) Active Directory Attack Surface. In Part 2 of this series, we’ll explore how attackers plan their movement and traverse attack paths once they have discovered AD vulnerabilities and misconfigurations that they can exploit. The Microsoft Active Directory (AD) ecosystem consists of all […]
In the recent SolarWinds hack and Ransomware attack on Colonial Pipeline, Active Directory (AD) compromise was at the core of the attack playbook. In this 3-part blog series, we look at protecting Microsoft Active Directory – which is central to most enterprise infrastructure layouts.
Securing Operational Technology (OT) networks is definitely “a thing” these days. OT environments include specialized equipment (e.g. PLCs) that monitor and control production facilities such as refineries, manufacturing plants and utilities. The stakes are high with respect to potential business continuity and safety impacts if something is compromised. To be sure, it’s not that CISOs […]