Blog

Looking Deeper into a Multi Stage Attack

The majority of today’s breaches are comprised of sophisticated multi-stage attacks.  The stages of such attacks can best be described by a “Cyber Kill Chain”, which breaks down cyber intrusions into the following steps:  Recon  → Weaponize → Deliver → Exploit →...

read more

Honeypots are dead. Long live honeypots…

Hi, I'm the resident hacker. These are thoughts from that point of view. Early Honeypots were not much of a success. This was deception fail, call it Deception 1.0…It was a great idea, good science experiment, but ultimately didn't stop much...and was not the honeypot...

read more

Announcing Acalvio’s Deception 2.0

Hello! Greetings from Acalvio!  We are joining the fight to keep our enterprises safe from malicious activity. While the problem is old, our approach is new and innovative.. read on! The IT industry has paralleled our traditional approach for defending physical assets...

read more