Category: Blog

  • Deception @ Work: Acalvio Detects CyberThreat @ Major Semiconductor Manufacturer

    Deception @ Work: Acalvio Detects CyberThreat @ Major Semiconductor Manufacturer

    Our newly released Deception @ Work report will share a summary of a semiconductor manufacturerbs cyberattack involving a recently discovered insider attack. This report will overview this attack, share details on the incidents of compromise, and provide evidence of the high accuracy and unique capabilities of deception technology in identifying cyberattacker activity. Our client, this […]

  • The Reserve Bank of India – Cyber Security Framework

    The Reserve Bank of India – Cyber Security Framework

    Mandating Robust Attack Detection, Response, and Recovery The cybersecurity guidelines issued by the Reserve Bank of India (RBI) in 2016 serve as a stark reminder of the need for robust cyber threat detection and response. Although the RBI released extensive IT security guidelines in 2011, it felt compelled to update its guidance with the bCyber […]

  • Deception and Compliance: The Co-Existence Conundrum

    Deception and Compliance: The Co-Existence Conundrum

    In our recent blog, we looked at using Deception solutions to satisfy compliance regulations, in particular controls which are intended to promote active discovery of anomalous behavior. In this blog webre switching gears and looking at a different aspect of compliance: how Deception should co-exist with compliance audits. The fundamental concern to be addressed is […]

  • Tunneling for Network Deceptions

    Tunneling for Network Deceptions

    Patent Awarded to Acalvio Acalvio was awarded U.S. Patent No. 20,170,310,706, titled bTunneling For Network Deceptionsb. This patent forms the basis of the Deception FarmsB. architecture. This blog goes a little deep into the patent to talk about what the patented technology is and the benefits. Abstract of the Patent Letbs start with the abstract […]

  • Deception and Compliance b Itbs the Intent that Matters

    Deception and Compliance b Itbs the Intent that Matters

    Compliance is like an annual checkup at the dentist: Nothing good is likely to come of it and we want it to be as fast and painless as possible. In the first of two blogs on compliance, webll consider how best to think about compliance intent, and how deception can play a valuable role. In […]

  • Ransomware Deja Vu – Louisiana Declares State Emergency After Cyberattacks on Schools

    Ransomware Deja Vu – Louisiana Declares State Emergency After Cyberattacks on Schools

    On 24 July, 2019 the State of Louisiana actually had to declare a state of emergency over what appears to have been a ransomware attack against at least three of the school districts within the state. So far, the districts impacted include Sabine, Ouachita, and Morehouse parishes. The attacks seemed to impact various information technology […]

  • Know Your Adversary, Before They ATT&CK

    Know Your Adversary, Before They ATT&CK

    The Cyber Kill Chain If youbre reading this blog, you likely know the basics of the cyber kill chain. You might even be able to name a few of the seven stages in the kill chain, which lays out the steps adversaries take to attack and exploit their victims. Where you might have a lot […]

  • Deception Technology in Healthcare – When Good Medical Devices Go Bad

    Deception Technology in Healthcare – When Good Medical Devices Go Bad

    Healthcare institutions continue to be heavily targeted by cyber attackers. A review of the current data in the Department of Health and Human Services, Office for Civil Rights (HHS OCR), database of major breaches shows that cyber attackers continue to compromise our healthcare institutions more with each passing year. If you examine the HHS OCR […]

  • Want to Get Serious about APTs? NIST Knows a Thing or Two, Because Theybve Seen a Thing or Two

    Want to Get Serious about APTs?  NIST Knows a Thing or Two, Because Theybve Seen a Thing or Two

    If there’s any organization that knows about dealing with advanced persistent threats (APTs) it’s NIST. The US government is constantly targeted by the most sophisticated adversaries, and the attacks are directed at both the government agencies themselves, and supporting organizations like service providers and defense contractors. Unfortunately, all too often these attacks have been successful. […]

  • “Amazon Firestickb is to bVCRb, as bDeceptionb is to _________

    “Amazon Firestickb is to bVCRb, as bDeceptionb is to _________

    Complete the Analogy: bAmazon Firestickb is to bVCRb, as bDeceptionb is to _________. Correct Answer: bHoneypotb Remember your SAT or ACT exams with the analogy questions? If so you probably got this one right. For those of us old enough to remember, Video Cassette Recorders were used to record TV programs. At least on a […]