Blog
Booz Allen Hamilton Announces Global Partnership with Acalvio to Provide Advanced Cyber Deception Capabilities
Booz Allen Hamilton announced a global partnership with Acalvio today to provide Advanced Cyber Deception Capabilities to Government and Commercial Organizations.
Combating Log4Shell Exploits
Apache Log4j is a Java library that is used to log messages (for diagnostics, troubleshooting, auditing, and information). This library also provides the ability to log information to various destinations such as databases, file consoles, and syslog, making it the...
Your Building’s Cyber Defenses Have Been Upgraded!
Today, Honeywell and Acalvio announced the launch of Honeywell Threat Defense Platform (HTDP) Powered by Acalvio. HTDP brings a new approach in the ongoing effort to secure Operation Technology (OT) networks including those networks running the health and safety...
Acalvio ShadowPlex Awarded FedRAMP Ready Status – Active Defense for Federal Government Agencies
Today we are pleased to announce that Acalvio’s cloud-based ShadowPlex Active Defense platform has been awarded FedRAMP Ready status by the US Government’s General Services Administration. This award demonstrates…
Protecting Microsoft Active Directory Part 3: Deception-based AD Security
Previously, we covered understanding AD Attack Surface and AD Attack Paths on this Active Directory Protection blog series. This post looks at Acalvio’s novel approach to protecting Active Directory against advanced persistent threats. It presents a critical attack...
Protecting Microsoft Active Directory Part 2: Attack Paths
In a previous blog, we provided an overview of the (unfortunately quite complex) Active Directory Attack Surface. In Part 2 of this series, we’ll explore how attackers plan their movement and traverse attack paths once they have discovered AD vulnerabilities and...
Protecting Microsoft Active Directory: Understanding the Attack Surface
In the recent SolarWinds hack and Ransomware attack on Colonial Pipeline, Active Directory (AD) compromise was at the core of the attack playbook. In this 3-part blog series, we look at protecting Microsoft Active Directory – which is central to most enterprise infrastructure layouts.
OT Risk Management – Deceiving Your Way to IT/OT Convergence
Securing Operational Technology (OT) networks is definitely “a thing” these days. OT environments include specialized equipment (e.g. PLCs) that monitor and control production facilities such as refineries, manufacturing plants and utilities. The stakes are high with...
Threat Hunting the Modern Way
When you think threat hunting, what comes to mind? For most enterprise security staff, the answer is “Hmmm, not sure if that’s for me”.