Resources
Acalvio-Blog-Deception Technology and Bank ATM
Deception Technology - Protecting Your Bank’s ATM Infrastructure Cyber attacks on automated teller machines (ATMs) have been running at full throttle for years. With over 3 million units, the automated teller machine remains a highly accessible and attractive target...
Massive Breach Hit Diagnostic Lab in Healthcare
Massive Breach Hits Diagnostic Lab in Healthcare Yet another massive breach has impacted the health care industry this June with Quest Diagnostic’s disclosure that 11.9 million customers may have their personal identifiable information (PII) access in yet another high...
COVID-19: An Ounce of Prevention is Worth a Pound of Cure
What to do to get in front of today’s Corona-related threats Perhaps the hacker’s motto should be “Don’t Let a Good Crisis Go to Waste”.
The Most Dangerous Threats to the Cloud
The digital transformation has been powered by several factors, the most important of which is the rapid move to the cloud. It is estimated today that 90 percent of organizations utilize some type of cloud service and that 60 percent of organizations use cloud...
Ransomware Shuts Down Company
Ransomware as a Service (RaaS) Ransomware as a Service (RaaS) continues to threaten enterprises of all sizes. RaaS is provided by organized crime for other criminals to use. The primary software creator is responsible for fixing bugs, evolving the functionality of the...
EU Strong Customer Authentication
Strong Customer Authentication The requirement for Strong Customer Authentication (SCA) went into effect this past September. Notwithstanding the deadline, several countries announced a delay in implementation which was approved by the European Banking Authority...
Deception Technology for Military and Defense
The U.S. DOD Cyber Strategy has evolved quickly to meet a broad mix of current and expected threats. Computer and network security controls and strategies are the foundation of new military warfighting strategies. They must be designed to gain and hold information...
Acalvio App to be Available on the CrowdStrike Store
CrowdStrike® Trusted Partners’ solutions go beyond simple integrations. Our partnership with CrowdStrike not only makes Deception easy to deploy for CrowdStrike customers, but also introduces a powerful new capability – Deception-based Active Threat Hunting. The...
Acalvio Detects CyberThreat at Global Manufacturer
This Anatomy of an Attacker report will share a summary of the cyber attacker activities recently discovered within the facilities of a major global manufacturer. In this report we summarize and overview this attack, share our view to some of the incidents of...
Acalvio Detects CyberThreat at Semiconductor Manufacturer
Our newly released Deception @ Work report will share a summary of a semiconductor manufacturer’s cyberattack involving a recently discovered insider attack. This report will overview this attack, share details on the incidents of compromise, and provide evidence of...
The Reserve Bank of India – Cyber Security Framework
Mandating Robust Attack Detection, Response, and Recovery The cybersecurity guidelines issued by the Reserve Bank of India (RBI) in 2016 serve as a stark reminder of the need for robust cyber threat detection and response. Although the RBI released extensive IT...
Deception and Compliance: The Co-Existence Conundrum
In our recent blog, we looked at using Deception solutions to satisfy compliance regulations, in particular controls which are intended to promote active discovery of anomalous behavior. In this blog we’re switching gears and looking at a different aspect of...