-
Acalvio-Blog-Deception Technology and Bank ATM

[et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″ header_2_font=”|600|||||||” header_2_line_height=”1.3em” header_3_line_height=”1.2em”] Deception Technology – Protecting Your Bankbs ATM Infrastructure Cyber attacks on automated teller machines (ATMs) have been running at full throttle for years. With over 3 million units, the automated teller machine remains a highly accessible and attractive target for cyber attackers. There are many […]
-
Massive Breach Hit Diagnostic Lab in Healthcare

[et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″] Massive Breach Hits Diagnostic Lab in Healthcare Yet another massive breach has impacted the health care industry this June with Quest Diagnosticbs disclosure that 11.9 million customers may have their personal identifiable information (PII) access in yet another high profile cyber breached. This data was contained in systems […]
-
COVID-19: An Ounce of Prevention is Worth a Pound of Cure

What to do to get in front of todayb s Corona-related threats Perhaps the hackerb s motto should be b Donb t Let a Good Crisis Go to Wasteb .
-
The Most Dangerous Threats to the Cloud

[et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”The digital transformation has been powered by several factors” _builder_version=”3.7.1″] The digital transformation has been powered by several factors, the most important of which is the rapid move to the cloud. It is estimated today that 90 percent of organizations utilize some type of cloud service and that 60 percent of organizations […]
-
Ransomware Shuts Down Company

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text admin_label=”Ransomware as a service (RaaS)” background_position=”top_left” background_repeat=”repeat” background_size=”initial” _builder_version=”3.7.1″] Ransomware as a Service (RaaS) Ransomware as a Service (RaaS) continues to threaten enterprises of all sizes. RaaS is provided by organized crime for other criminals to use. The primary software creator is responsible for fixing bugs, evolving […]
-
EU Strong Customer Authentication

Strong Customer Authentication The requirement for Strong Customer Authentication (SCA) went into effect this past September. Notwithstanding the deadline, several countries announced a delay in implementation which was approved by the European Banking Authority (EBA). SCA is a specific requirement of the Revised Directive on Payment Services (PSD2), originally issued in 2015 and subsequently amended […]
-
Deception Technology for Military and Defense

The U.S. DOD Cyber Strategy has evolved quickly to meet a broad mix of current and expected threats. Computer and network security controls and strategies are the foundation of new military warfighting strategies. They must be designed to gain and hold information advantage, to strike at any distance, and to enable reliable and secure global […]
-
Important Use Cases That Make MITRE ATT&CK Compelling

As we have discussed before in previous blogs, MITRE ATT&CK is a critical and important technology tools that can help you logically assess your security controls against the risks you are likely to face. It is critical for all of us to understand the gaps we have in your current cyberdefense. There are several important […]
-
Acalvio App to be Available on the CrowdStrike Store

CrowdStrike® Trusted Partnersb solutions go beyond simple integrations. Our partnership with CrowdStrike not only makes Deception easy to deploy for CrowdStrike customers, but also introduces a powerful new capability b Deception-based Active Threat Hunting. The CrowdStrike Falcon® platform offers next-generation endpoint security with an intelligent, easy-to-install lightweight agent. ShadowPlex Autonomous Deception Solution uses the Falcon […]
-
Deception @ Work: Acalvio Detects CyberThreat @ Major Global Manufacturer

This Anatomy of an Attacker report will share a summary of the cyber attacker activities recently discovered within the facilities of a major global manufacturer. In this report we summarize and overview this attack, share our view to some of the incidents of compromise, and provide evidence of the unique efficacy of deception technology in […]