Acalvio Logo

Blog

Deception Technology and SWIFT

Deception Technology and SWIFT

Deception Technology - Locking Down Banking and the SWIFT Network Over the past several years, banks using the Society for World Interbank Financial Telecommunication (SWIFT) financial network have continued to be the victim of ongoing cyber attacks. This is not to...

read more
Acalvio-Blog-Deception Technology and Bank ATM

Acalvio-Blog-Deception Technology and Bank ATM

Deception Technology - Protecting Your Bank’s ATM Infrastructure Cyber attacks on automated teller machines (ATMs) have been running at full throttle for years. With over 3 million units, the automated teller machine remains a highly accessible and attractive target...

read more
Massive Breach Hit Diagnostic Lab in Healthcare

Massive Breach Hit Diagnostic Lab in Healthcare

Massive Breach Hits Diagnostic Lab in Healthcare Yet another massive breach has impacted the health care industry this June with Quest Diagnostic’s disclosure that 11.9 million customers may have their personal identifiable information (PII) access in yet another high...

read more
The Most Dangerous Threats to the Cloud

The Most Dangerous Threats to the Cloud

The digital transformation has been powered by several factors, the most important of which is the rapid move to the cloud. It is estimated today that 90 percent of organizations utilize some type of cloud service and that 60 percent of organizations use...

read more
Ransomware Shuts Down Company

Ransomware Shuts Down Company

Ransomware as a Service (RaaS) Ransomware as a Service (RaaS) continues to threaten enterprises of all sizes. RaaS is provided by organized crime for other criminals to use. The primary software creator is responsible for fixing bugs, evolving the functionality of the...

read more
EU Strong Customer Authentication

EU Strong Customer Authentication

Strong Customer Authentication The requirement for Strong Customer Authentication (SCA) went into effect this past September. Notwithstanding the deadline, several countries announced a delay in implementation which was approved by the European Banking Authority...

read more
Deception Technology for Military and Defense

Deception Technology for Military and Defense

The U.S. DOD Cyber Strategy has evolved quickly to meet a broad mix of current and expected threats. Computer and network security controls and strategies are the foundation of new military warfighting strategies. They must be designed to gain and hold information...

read more
Loading...