Acalvio Logo

If Deception is so Great, Why Isn’t Everyone Doing it?

Using deception as a threat detection solution would seem to be a no-brainer:  It can detect malware at multiple points in the kill chain, with no false positives and no modifications or impact to production systems.  Everyone must be doing it you would think....
DECEPTION: YOU KEEP USING THAT WORD…

DECEPTION: YOU KEEP USING THAT WORD…

I DO NOT THINK IT MEANS WHAT YOU THINK IT MEANS If you recognize the quote in the title of this blog entry, then you also know one of my favorite movies of all time is Princess Bride. If you didn’t recognize it, here’s a relevant reminder:...
The Reserve Bank of India – Cyber Security Framework

The Reserve Bank of India – Cyber Security Framework

Mandating Robust Attack Detection, Response, and Recovery The cybersecurity guidelines issued by the Reserve Bank of India (RBI) in 2016 serve as a stark reminder of the need for robust cyber threat detection and response. Although the RBI released extensive IT...
Deception and Compliance: The Co-Existence Conundrum

Deception and Compliance: The Co-Existence Conundrum

In our recent blog, we looked at using Deception solutions to satisfy compliance regulations, in particular controls which are intended to promote active discovery of anomalous behavior. In this blog we’re switching gears and looking at a different aspect of...
Loading...