Blog

2017 Predictions AND “wants”

Going to do this one a little differently, part of it is going to be the typical “throw the crystal ball over the shoulder” stuff that we all do…although honestly JUST going to 2017 is not far enough for some of the stuff we are working on…and the other part of this...

read more

Looking Deeper into a Multi Stage Attack

The majority of today’s breaches are comprised of sophisticated multi-stage attacks.  The stages of such attacks can best be described by a “Cyber Kill Chain”, which breaks down cyber intrusions into the following steps:  Recon  → Weaponize → Deliver → Exploit →...

read more

Honeypots are dead. Long live honeypots…

Hi, I'm the resident hacker. These are thoughts from that point of view. Early Honeypots were not much of a success. This was deception fail, call it Deception 1.0…It was a great idea, good science experiment, but ultimately didn't stop much...and was not the honeypot...

read more

Announcing Acalvio’s Deception 2.0

Hello! Greetings from Acalvio!  We are joining the fight to keep our enterprises safe from malicious activity. While the problem is old, our approach is new and innovative.. read on! The IT industry has paralleled our traditional approach for defending physical assets...

read more