Deception could be a game changer in terms of detecting Ransomware.
Detecting attackers with kubernetes driven deception in cloud-native applications
Deceiving Attackers in a Kubernetes World
Enterprise workloads are rapidly migrating from on-prem data centers or private clouds towards public clouds, run by players such as Amazon and Microsoft. While CIOs and IT leaders have been spending the past few years reeling in these individual public cloud islands,...
Virus Bulletin Shortlists Acalvio Research for Péter Szőr Award.
GDPR & Deception
Author: Satnam Singh, Chief Data Scientist at Acalvio Technologies How do we detect and profile the adversaries who have already infiltrated and are hiding in the network? To answer this question, we need an approach that can improve the detection and provide more...
Being a CISO these days isn’t easy. The threats are dynamic, the technology hype bewildering, and the expectations from the boss to magically “just make the problem go away” unrelenting. One way to help get a grip on this mess is to adopt industry accepted frameworks...
US-Cert recently issued notification regarding malicious cyber activity by the North Korean government  Hidden Cobra.