by Team Acalvio | Feb 13, 2019 | Blog
In the past few blogs we zeroed in on the cloud native environments being the next frontier for the attacker-defender games. We also commented on how deploying deception in a Kubernetes-based environment is an easy approach to detecting attackers that have breached...
by Team Acalvio | Feb 7, 2019 | Blog
Applications are moving to cloud-native Kubernetes-based platforms, come hell or high water, lift-and-shift as stateful apps or rewrite into a microservice design. Now what? The malware and threads follow the applications to these cloud native platforms. As the Tesla...
by Team Acalvio | Jan 25, 2019 | Blog
Enterprise workloads are rapidly migrating from on-prem data centers or private clouds towards public clouds, run by players such as Amazon and Microsoft. While CIOs and IT leaders have been spending the past few years reeling in these individual public cloud islands,...
by Rick Moy | Oct 16, 2018 | Blog
The world-renowned Virus Bulletin organization has shortlisted an Acalvio Research paper for it’s prestigious Péter Szőr Award. VB, known for its decades of antimalware testing, holds an annual awards ceremony to honor the industry’s work in combatting...
by Rick Moy | Oct 15, 2018 | Blog
Organizations are just starting to come to grips with the new European Union privacy law, GDPR. Following a flurry of emails and website warnings asking people to acknowledge updated data use policies (which virtually no one reads anyway), the question is “What do we...
by Jordan Hubert | Oct 9, 2018 | Blog
Author: Satnam Singh, Chief Data Scientist at Acalvio Technologies How do we detect and profile the adversaries who have already infiltrated and are hiding in the network? To answer this question, we need an approach that can improve the detection and provide more...