Advanced Cyber Deception Removes the Adversary’s Advantage Featured Speakers: Bill Kalogeros, Director, Public Sector, Acalvio Jim Mason, Senior Solutions Engineer, Acalvio Thursday, October 15, 2020 2:00pm ET; 11:00 AM PT
Decoys, Lures and Breadcrumbs:Deception Technology Turns the Tables on Attackers About this WebinarThe use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the...
In the recent SolarWinds hack and Ransomware attack on Colonial Pipeline, Active Directory (AD) compromise was at the core of the attack playbook. In this 3-part blog series, we look at protecting Microsoft Active Directory – which is central to most enterprise infrastructure layouts.
Securing Operational Technology (OT) networks is definitely “a thing” these days. OT environments include specialized equipment (e.g. PLCs) that monitor and control production facilities such as refineries, manufacturing plants and utilities. The stakes are high with respect to potential business continuity and safety impacts if something is compromised. To be sure, it’s not that CISOs […]