Category: Blog

  • Booz Allen Hamilton Announces Global Partnership with Acalvio to Provide Advanced Cyber Deception Capabilities

    Booz Allen Hamilton Announces Global Partnership with Acalvio to Provide Advanced Cyber Deception Capabilities

    Booz Allen Hamilton announced a global partnership with Acalvio today to provide Advanced Cyber Deception Capabilities to Government and Commercial Organizations.

  • Combating Log4Shell Exploits

    Combating Log4Shell Exploits

    [et_pb_section fb_built=”1″ _builder_version=”3.22″][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Apache Log4j is a Java library” _builder_version=”4.7.0″ link_text_color=”#a21d20″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”] Apache Log4j is a Java library that is used to log messages (for diagnostics, troubleshooting, auditing, and information). This library also provides the ability to log information to various destinations such as databases, […]

  • Your Buildingbs Cyber Defenses Have Been Upgraded!

    Your Buildingbs Cyber Defenses Have Been Upgraded!

    [et_pb_section fb_built=”1″ admin_label=”Honeywell Blog” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_row admin_label=”Honeywell Blog” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Today, Honeywell and Acalvio announced the launch of ” _builder_version=”4.7.0″ _module_preset=”default” header_2_font=”|600|||||||” module_alignment=”center”]Today, Honeywell and Acalvio announced the launch of Honeywell Threat Defense Platform (HTDP) Powered by Acalvio. HTDP brings a new approach in the ongoing effort to secure Operation Technology (OT) […]

  • Acalvio ShadowPlex Awarded FedRAMP Ready Status b Active Defense for Federal Government Agencies

    Acalvio ShadowPlex Awarded FedRAMP Ready Status b Active Defense for Federal Government Agencies

    Today we are pleased to announce that Acalvio’s cloud-based ShadowPlex Active Defense platform has been awarded FedRAMP Ready status by the US Government’s General Services Administration. This award demonstrates…

  • Protecting Microsoft Active Directory Part 3: Deception-based AD Security

    Protecting Microsoft Active Directory Part 3:  Deception-based AD Security

    [et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Previously, we covered understanding” _builder_version=”4.7.0″ _module_preset=”default” link_font=”|600||||||#000000|” link_text_color=”#a21d20″] Previously, we covered understanding AD Attack Surface and AD Attack Paths on this Active Directory Protection blog series. This post looks at Acalviobs novel approach to protecting Active Directory against advanced persistent threats. It presents a critical attack […]

  • Protecting Microsoft Active Directory Part 2: Attack Paths

    Protecting Microsoft Active Directory Part 2:  Attack Paths

    [et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”In a previous blog, we provided an overview of” _builder_version=”4.7.0″ _module_preset=”default” link_font=”|600||||||#000000|” link_text_color=”#a21d20″ hover_enabled=”0″ sticky_enabled=”0″] In a previous blog, we provided an overview of the (unfortunately quite complex) Active Directory Attack Surface. In Part 2 of this series, webll explore how attackers plan their movement and […]

  • Protecting Microsoft Active Directory: Understanding the Attack Surface

    Protecting Microsoft Active Directory: Understanding the Attack Surface

    In the recent SolarWinds hack and Ransomware attack on Colonial Pipeline, Active Directory (AD) compromise was at the core of the attack playbook. In this 3-part blog series, we look at protecting Microsoft Active Directory b which is central to most enterprise infrastructure layouts.

  • OT Risk Management b Deceiving Your Way to IT/OT Convergence

    OT Risk Management b Deceiving Your Way to IT/OT Convergence

    [et_pb_section fb_built=”1″ admin_label=”OT Risk Management ” _builder_version=”4.7.0″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text admin_label=”Securing Operational Technology (OT) networks” _builder_version=”4.7.0″ text_font=”||||||||” text_text_color=”#000000″ header_text_color=”#000000″ header_2_font=”|600|||||||” header_2_line_height=”1.3em” header_3_line_height=”1.2em”] Securing Operational Technology (OT) networks is definitely ba thingb these days. OT environments include specialized equipment (e.g. PLCs) that monitor and control production facilities such as refineries, manufacturing plants and utilities. The stakes […]

  • Threat Hunting the Modern Way

    Threat Hunting the Modern Way

    When you think threat hunting, what comes to mind? For most enterprise security staff, the answer is bHmmm, not sure if thatbs for meb.

  • The Solarwinds Attack b Donbt Trust; Always Verify

    The Solarwinds Attack b Donbt Trust; Always Verify

    Whatbs the biggest lesson from the SolarWinds fiasco? Just focusing security defenses on the most common means of penetrating an organization doesnbt cut it.