Acalvio Staging

  • Acalvio Buyers Guide
  • Acalvio Crowdstrike Partnership
  • Acalvio Customer Reference Consumer Services
  • Acalvio ShadowPlex Active-Directory Protection
  • Acalvio ShadowPlex Case Study: Financial Services Company
  • Acalvio ShadowPlex Customer Reference Research University
  • Acalvio ShadowPlex Customer Reference: Industrial Manufacturer
  • Acalvio Verizon Blackhat 2019
  • Acalvio-and-NIST-SP-800-171B
  • Active Directory Protection
  • Active Threat Hunting with Autonomous Deception
  • Alliances
  • Apply Now
  • at-a-glance
  • Blog
    • Thank You
  • Blog
    • Resources
  • Blog-2020
  • Cisco Solution Brief
  • Cloud Software Engineer
  • Combat Zero Day ransomware
  • Company
    • Careers Thank You
  • Contact
  • Crowdstrike
  • Data Processing Agreement
  • Deception and the MITRE Att&ck Framework
  • Deception for Dummies
  • deception2dot0
  • Decoys, Lures and Breadcrumbs: Deception Technology Turns the Tables on Attackers
  • Divi Slider
  • Download 3 Minutes Until the Apocalypse
  • Download Acalvio Deception NIST CSF White Paper
  • Download the Definitive Guide to Cyber Deception 2.0
  • DR TEST PAGE
  • EMA Research Report
  • EPRI_Deception_Paper
  • ESG Labs WhitePaper
  • eula
  • Firecompass Deception Report
  • firecompass_buyers_guide
  • Form Testing
  • From Honeypots to Modern Cyber Deception: The Path to Greater ROI and Effectiveness
  • High Accuracy, Low Noise Breach Detection
  • HOME
  • Home 2021
  • Home 2022
  • Market Spotlight for Cyber Deception Systems
  • Osterman Research Paper
  • OT Risk Management b Deceiving Your Way to OT/ICS Security
  • Partners
  • plbleads
  • Privacy Policy
  • Privacy Policy
  • Product
  • Product Backup
  • Public Sector
  • QA Engineer
  • Request A Demo
  • Reseller
  • Resources
    • Analyst Reports
    • Case Studies
      • Acalvio Customer Reference – Consumer Packaged Goods
      • Acalvio ShadowPlex – Customer Reference Digital Media
      • Acalvio ShadowPlex – Customer Reference Semiconductor
    • Data Sheets
    • E- Books
    • E-Books
    • Events
    • Events
    • In the News
    • Press Releases
    • Thank You
    • Webinars
    • Webinars
    • White Papers
      • 7 Critical Considerations for Effective Breach Detection
  • Review Pages
    • Active Defense
    • Careers
    • Detect Respond
    • Director Product Marketing, Security
    • Intelligent SOC & Threat Hunting
    • Main
    • Regional Sales Director – Central
    • Regional Sales Director – East
    • ShadowPlex Identity Security
    • SIPM
    • Technology
    • What is Deception
    • Why Deception
  • RSA 2020
  • RSS FEED
  • Sample Page
  • SANS Webinar – Real World Implementation of Deception Technologies
  • SANS Whitepaper
  • Schedule a Demo
  • Schedule a Meeting
  • SDN-Network Developer
  • Setup a Meeting with Us
  • ShadowPlex – Combating Zero-Day Ransomware
  • ShadowPlex Cloud
  • ShadowPlex Cloud b Datasheet
  • ShadowPlex Crowdstrike
  • ShadowPlex Crowdstrike Solution Brief
  • ShadowPlex Crowdstrike-2 col
  • ShadowPlex Google Cloud Data Sheet
  • ShadowPlex-2020
  • ShadowPlex-Cloud-2020
  • Sitemap
  • Slider 2019
  • Slider Test Page
  • Solution Brief: How deception can improve your security and identity posture
  • Template 2018
  • TEST Company
  • Thank You
  • Thank you for Contacting Us
  • Thank you for Demo Request
  • The KuppingerCole Leader Compass Report 2021
  • Threat Hunting
  • Unifying Risk Management and Threat Detection for IT/OT Convergence
  • US Federal
  • Why Acalvio
    • FAQ and Glossary
  • Why Acalvio 2020
  • Why Active Defense?
Illustration of a bird flying.
  • Acalvio Selected as SC Media 2018 Trust Award Finalist

    Acalvio Selected as SC Media 2018 Trust Award Finalist

    ShadowPlex Shortlisted in Best Deception Technology Category

    March 19, 2018
  • Acalvio Partners with Splunk to Deliver Industrybs First Active Deception-Based Ransomware Solution

    Acalvio Partners with Splunk to Deliver Industrybs First Active Deception-Based Ransomware Solution

    Immediate availability of ShadowPlex-R

    March 19, 2018
  • Acalvio to Demonstrate Deception 2.0 Technology at Gartner Security & Risk Management Summit

    Acalvio to Demonstrate Deception 2.0 Technology at Gartner Security & Risk Management Summit

    Innovator in Advanced Threat Defense

    March 19, 2018
  • bDeception 2.0 for Dummiesb Examines Fundamentals of Next Generation Deception Technology

    bDeception 2.0 for Dummiesb Examines Fundamentals of Next Generation Deception Technology

    Acalvio eBook

    March 19, 2018
  • A Game Between Adversary and Defender

    A Game Between Adversary and Defender

    The motivation for this blog is a question that has been circling in my head for a long time, and I have asked this question to many security analysts: Have they played a game with an adversary? or in other words – Have they engaged with an adversary? I got mixed responses. Many security analysts […]

    March 1, 2018
  • WannMine – Lateral Movement Techniques

    WannMine – Lateral Movement Techniques

    [et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ sticky_enabled=”0″]Acalvio Threat Research Labs Introduction: Cryptominer is quickly becoming one of the greatest threats that is facing our industry. Similar to ransomware, it provides an easy avenue for a threat actor to monetize his/her skills. In one […]

    February 23, 2018
  • Technical Analysis of Samsam Ransomware.

    Technical Analysis of Samsam Ransomware.

    Ransomware continues to represent the most critical threat facing organizations in 2018. In the latest breaches at Hancock Memorial Hospital, Adams Memorial Hospital, and Allscripts, SamSam ransomware was used to encrypt the files. In this blog, we dive into the technical details of the SamSam ransomware [1]. The blog then shares how the Samsam ransomware […]

    January 24, 2018
  • Ransomware Command and Control Detection using Machine Learning

    Ransomware Command and Control Detection using Machine Learning

    Authors: Deepak Gujraniya, Mohammad Waseem, Balamurali AR, and Satnam Singh Since the first attack in 1989 [1], ransomware attacks have gained popularity. Especially in 2017, it has created havoc in every possible industry, including the government offices, public-sector departments, and hospitals. Apart from the financial strain that ransomware can bring, it also affects everyday aspects […]

    January 15, 2018
  • Lateral Movement analysis of Zealot Campaign and its detection by Distributed Deception Architecture.

    Lateral Movement analysis of Zealot Campaign and its detection by Distributed Deception Architecture.

    Acalvio Threat Research Labs Web Servers are becoming one of the entry vectors in breaches. In theB last blog,B I had shared the details of deception based architecture to prevent breaches involving web server as an entry vector. In this blog, we takeB Zealot campaign as a case study to show the effectiveness of deception […]

    January 12, 2018
  • Deception Centric Architecture to prevent Breaches involving WebServer.

    Deception Centric Architecture to prevent Breaches involving WebServer.

    Web Server is becoming one of the critical vector which have been exploited by a threat actor to breach an organization. Breach at Equifax is one such example, affecting 143 million customers. In this breach, a threat actor could access the internal network and exfiltrate the confidential data by exploiting a vulnerability in a Web […]

    December 11, 2017
←Previous Page
1 … 21 22 23 24 25 … 33
Next Page→

Acalvio Staging

Proudly powered by WordPress