This whitepaper describes seven priorities for any breach detection strategy.
Acalvio ShadowPlex in OT/ICS Environments
Unifying Risk Management and Threat Detection for IT/OT Convergence
Cyber Security Threats in Government: A Snapshot
CISO’S GUIDE TO DECEPTION TECHNOLOGY
MITRE ATT&CK Framework and Deception focus on common attack behaviors
High-fidelity Deception Alerts in the SOC
Download Acalvio Deception NIST_CSF White Paper