Category: Blog

  • Honeypots are dead! Long live Honeypotsb&(Part 1 – Many Targets One Access Point)

    Initial Reconnaissance b About to explain Initial Compromise b About to launch Establish Footholds – Escalate Privileges Additional Reconnaissance where we will move laterally and continue to maintain presence Complete Initial Reconnaissance: bLet me show you how I find youb OSINT, SIGINT, HUMINT Google is your friend Forums are treasure troves (both the official Cisco/Oracle […]

  • Honeypots are dead. Long live honeypots…

    Honeypots are dead. Long live honeypots…

    Hi, I’m the resident hacker. These are thoughts from that point of view. Early Honeypots were not much of a success. This was deception fail, call it Deception 1.0b&It was a great idea, good science experiment, but ultimately didn’t stop much…and was not the honeypot that kept the likes of me out of your environment….. […]

  • Acalvio CEO Interview on Deception 2.0 at Splunk .conf

    Acalvio CEO Interview on Deception 2.0 at Splunk .conf

    [et_pb_section fb_built=”1″ _builder_version=”3.22″][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://youtu.be/mUN93LZnO9s” url_new_window=”on” button_text=”WATCH VIDEO ON YOUTUBE” admin_label=”Acalvio CEO Interview on Deception 2.0 at Splunk .conf Oct 10, 2016″ _builder_version=”4.7.0″ _module_preset=”default” custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#a21d20″ button_border_color=”#a21d20″ button_font=”Roboto|500|||||||” button_icon=”%%40%%” button_icon_color=”#ffffff”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]

  • Announcing Acalvio’s Deception 2.0

    Announcing Acalvio’s Deception 2.0

    Hello! Greetings from Acalvio! B We are joining the fight to keep our enterprises safe from malicious activity. While the problem is old, our approach is new and innovative.. read on! The IT industry has paralleled our traditional approach for defending physical assets b build perimeter defenses. B Walls, moats, doors, locks, identification, etc. are […]

  • Why deception is necessary for the cyber security?

    Why deception is necessary for the cyber security?

    When I joined Acalvio, a stealth deception startup, one of the most commonly asked questions from my co-workers and friends started like this: okay tell us why deception was so important that youbd move away from DNS security – a subject you have enjoyed working on for such a long time (measured in the digital […]