November 27, 2018 | Renaissance Dallas Hotel

Inc. – Banned Your Laptop? Try These Travel Gadgets Instead
Inc. – Banned Your Laptop? Try These Travel Gadgets Instead

PGurus – Startup Series #2 – A chat with Nat Natraj, CEO of a Cyber Security startup
PGurus – Startup Series #2 – A chat with Nat Natraj, CEO of a Cyber Security startup

The Industry’s First “Deception 2.0 for Dummies” Book
Since the dawn of time, deception has been used in nature in various forms as a successful survival strategy and has played an important role in the physical and behavioral adaptations of all organisms. Humankind, with its higher cognitive ability, has successfully...

“Deception 2.0 for Dummies” Examines Fundamentals of Next Generation Deception Technology
Acalvio eBook

WannaCry Ransomware Analysis: Lateral Movement Propagation
Acalvio Threat Research Labs The WannaCry ransomware attack has made front page news around the world, with at least 150 countries and 200,000 customers affected [2]. Because WannaCry makes use of a largely unpatched Windows exploit for lateral movement, it is able to...

Securing FinTech though Deception 2.0 Technologies

SecurityWeek – Industry Reactions to Trump’s Cybersecurity Executive Order
SecurityWeek – Industry Reactions to Trump’s Cybersecurity Executive Order

SC Magazine – A Cyber Geneva Convention
SC Magazine – A Cyber Geneva Convention

How to outfox Shamoon? Put Deception to work!
Acalvio Threat Labs Shamoon is one of the critical threats that has been able to penetrate traditional defenses successfully not once, twice, but thrice - in 2012, 2016 and 2017. The main purpose of Shamoon Threat Actor was the destruction of the endpoint computers...
If Deception is so Great, Why Isn’t Everyone Doing it?
Using deception as a threat detection solution would seem to be a no-brainer: It can detect malware at multiple points in the kill chain, with no false positives and no modifications or impact to production systems. Everyone must be doing it you would think....