Logo of Acalvio, a leading company in cyber deception technology
Important MITRE ATT&CK Use Cases That Make It Compelling

Important MITRE ATT&CK Use Cases That Make It Compelling

As discussed in our previous blogs, the MITRE ATT&CK framework is a critical technology resource that can help you systematically evaluate your security measures against the potential threats you may encounter. Understanding the weaknesses in your current...
Hacking Back With The Active Cyber Defense Certainty Act

Hacking Back With The Active Cyber Defense Certainty Act

H.R. 3270 …also known as the Active Cyber Defense Certainty Act (ACDC), will, if it becomes law, allow victims of hacking to execute self-defense outside of their networks. The essence of this bill was originally introduced in 2017 as H.R. 4036, which...
Understanding Anomalous Behavior and Malicious Intent

Understanding Anomalous Behavior and Malicious Intent

Malicious behavior: we generally know it when we see it Most of the time, unfortunately, malicious behavior is hidden from view. Consider that the average dwell time for cyberattackers within networks is still measured in months. Per FireEye, the global median dwell...
Guarding Industrial Systems: Debunking Three Cyber Myths

Guarding Industrial Systems: Debunking Three Cyber Myths

The Threat to ICS in Context Industrial control systems (ICS) are the key infrastructure targets for nation-state attackers and fringe bad actors seeking to compromise or destroy public utilities and manufacturing industry operations. In some cases simple tools such...
Acalvio-Blog-Deception Technology and Bank ATM

Acalvio-Blog-Deception Technology and Bank ATM

Deception Technology – Protecting Your Bank’s ATM Infrastructure Cyber attacks on automated teller machines (ATMs) have been running at full throttle for years. With over 3 million units, the automated teller machine remains a highly accessible and attractive...
Loading...