Deception Technology for Military and Defense

Deception Technology for Military and Defense

The U.S. DOD Cyber Strategy has evolved quickly to meet a broad mix of current and expected threats. Computer and network security controls and strategies are the foundation of new military warfighting strategies. They must be designed to gain and hold information...
Important Use Cases That Make MITRE ATT&CK Compelling

Important Use Cases That Make MITRE ATT&CK Compelling

As we have discussed before in previous blogs, MITRE ATT&CK is a critical and important technology tools that can help you logically assess your security controls against the risks you are likely to face. It is critical for all of us to understand the gaps we...
Acalvio App to be Available on the CrowdStrike Store

Acalvio App to be Available on the CrowdStrike Store

CrowdStrike® Trusted Partners’ solutions go beyond simple integrations. Our partnership with CrowdStrike not only makes Deception easy to deploy for CrowdStrike customers, but also introduces a powerful new capability – Deception-based Active Threat Hunting. The...
The Reserve Bank of India – Cyber Security Framework

The Reserve Bank of India – Cyber Security Framework

Mandating Robust Attack Detection, Response, and Recovery The cybersecurity guidelines issued by the Reserve Bank of India (RBI) in 2016 serve as a stark reminder of the need for robust cyber threat detection and response. Although the RBI released extensive IT...