Blog
Important Use Cases That Make MITRE ATT&CK Compelling
As we have discussed before in previous blogs, MITRE ATT&CK is a critical and important technology tools that can help you logically assess your security controls against the risks you are likely to face. It is critical for all of us to understand the gaps we have in...
Acalvio App to be Available on the CrowdStrike Store
CrowdStrike® Trusted Partners’ solutions go beyond simple integrations. Our partnership with CrowdStrike not only makes Deception easy to deploy for CrowdStrike customers, but also introduces a powerful new capability – Deception-based Active Threat Hunting. The...
Deception @ Work: Acalvio Detects CyberThreat @ Major Global Manufacturer
This Anatomy of an Attacker report will share a summary of the cyber attacker activities recently discovered within the facilities of a major global manufacturer. In this report we summarize and overview this attack, share our view to some of the incidents of...
Deception @ Work: Acalvio Detects CyberThreat @ Major Semiconductor Manufacturer
Our newly released Deception @ Work report will share a summary of a semiconductor manufacturer’s cyberattack involving a recently discovered insider attack. This report will overview this attack, share details on the incidents of compromise, and provide evidence of...
The Reserve Bank of India – Cyber Security Framework
Mandating Robust Attack Detection, Response, and Recovery The cybersecurity guidelines issued by the Reserve Bank of India (RBI) in 2016 serve as a stark reminder of the need for robust cyber threat detection and response. Although the RBI released extensive IT...
Deception and Compliance: The Co-Existence Conundrum
In our recent blog, we looked at using Deception solutions to satisfy compliance regulations, in particular controls which are intended to promote active discovery of anomalous behavior. In this blog we’re switching gears and looking at a different aspect of...
Tunneling for Network Deceptions
Patent Awarded to Acalvio Acalvio was awarded U.S. Patent No. 20,170,310,706, titled “Tunneling For Network Deceptions”. This patent forms the basis of the Deception Farms® architecture. This blog goes a little deep into the patent to talk about what the patented...
Deception and Compliance – It’s the Intent that Matters
Compliance is like an annual checkup at the dentist: Nothing good is likely to come of it and we want it to be as fast and painless as possible. In the first of two blogs on compliance, we’ll consider how best to think about compliance intent, and how deception can...
Ransomware Deja Vu – Louisiana Declares State Emergency After Cyberattacks on Schools
On 24 July, 2019 the State of Louisiana actually had to declare a state of emergency over what appears to have been a ransomware attack against at least three of the school districts within the state. So far, the districts impacted include Sabine, Ouachita, and...