Acalvio Staging

  • Acalvio Buyers Guide
  • Acalvio Crowdstrike Partnership
  • Acalvio Customer Reference Consumer Services
  • Acalvio ShadowPlex Active-Directory Protection
  • Acalvio ShadowPlex Case Study: Financial Services Company
  • Acalvio ShadowPlex Customer Reference Research University
  • Acalvio ShadowPlex Customer Reference: Industrial Manufacturer
  • Acalvio Verizon Blackhat 2019
  • Acalvio-and-NIST-SP-800-171B
  • Active Directory Protection
  • Active Threat Hunting with Autonomous Deception
  • Alliances
  • Apply Now
  • at-a-glance
  • Blog
    • Thank You
  • Blog
    • Resources
  • Blog-2020
  • Cisco Solution Brief
  • Cloud Software Engineer
  • Combat Zero Day ransomware
  • Company
    • Careers Thank You
  • Contact
  • Crowdstrike
  • Data Processing Agreement
  • Deception and the MITRE Att&ck Framework
  • Deception for Dummies
  • deception2dot0
  • Decoys, Lures and Breadcrumbs: Deception Technology Turns the Tables on Attackers
  • Divi Slider
  • Download 3 Minutes Until the Apocalypse
  • Download Acalvio Deception NIST CSF White Paper
  • Download the Definitive Guide to Cyber Deception 2.0
  • DR TEST PAGE
  • EMA Research Report
  • EPRI_Deception_Paper
  • ESG Labs WhitePaper
  • eula
  • Firecompass Deception Report
  • firecompass_buyers_guide
  • Form Testing
  • From Honeypots to Modern Cyber Deception: The Path to Greater ROI and Effectiveness
  • High Accuracy, Low Noise Breach Detection
  • HOME
  • Home 2021
  • Home 2022
  • Market Spotlight for Cyber Deception Systems
  • Osterman Research Paper
  • OT Risk Management b Deceiving Your Way to OT/ICS Security
  • Partners
  • plbleads
  • Privacy Policy
  • Privacy Policy
  • Product
  • Product Backup
  • Public Sector
  • QA Engineer
  • Request A Demo
  • Reseller
  • Resources
    • Analyst Reports
    • Case Studies
      • Acalvio Customer Reference – Consumer Packaged Goods
      • Acalvio ShadowPlex – Customer Reference Digital Media
      • Acalvio ShadowPlex – Customer Reference Semiconductor
    • Data Sheets
    • E- Books
    • E-Books
    • Events
    • Events
    • In the News
    • Press Releases
    • Thank You
    • Webinars
    • Webinars
    • White Papers
      • 7 Critical Considerations for Effective Breach Detection
  • Review Pages
    • Active Defense
    • Careers
    • Detect Respond
    • Director Product Marketing, Security
    • Intelligent SOC & Threat Hunting
    • Main
    • Regional Sales Director – Central
    • Regional Sales Director – East
    • ShadowPlex Identity Security
    • SIPM
    • Technology
    • What is Deception
    • Why Deception
  • RSA 2020
  • RSS FEED
  • Sample Page
  • SANS Webinar – Real World Implementation of Deception Technologies
  • SANS Whitepaper
  • Schedule a Demo
  • Schedule a Meeting
  • SDN-Network Developer
  • Setup a Meeting with Us
  • ShadowPlex – Combating Zero-Day Ransomware
  • ShadowPlex Cloud
  • ShadowPlex Cloud b Datasheet
  • ShadowPlex Crowdstrike
  • ShadowPlex Crowdstrike Solution Brief
  • ShadowPlex Crowdstrike-2 col
  • ShadowPlex Google Cloud Data Sheet
  • ShadowPlex-2020
  • ShadowPlex-Cloud-2020
  • Sitemap
  • Slider 2019
  • Slider Test Page
  • Solution Brief: How deception can improve your security and identity posture
  • Template 2018
  • TEST Company
  • Thank You
  • Thank you for Contacting Us
  • Thank you for Demo Request
  • The KuppingerCole Leader Compass Report 2021
  • Threat Hunting
  • Unifying Risk Management and Threat Detection for IT/OT Convergence
  • US Federal
  • Why Acalvio
    • FAQ and Glossary
  • Why Acalvio 2020
  • Why Active Defense?
Illustration of a bird flying.
  • Meeting HIPAA Requirements with Acalviobs Deception 2.0 Solution, ShadowPlex

    Meeting HIPAA Requirements with Acalviobs Deception 2.0 Solution, ShadowPlex

    The recent ransomware attacks such as Wannacry have highlighted the need for robust security controls in healthcare firms.B These organizations are subject to HIPAA/HITECH compliance requirements, but unfortunately many firms just seem them as a distraction. B This is a big mistake: The controls typically implemented for HIPAA/HITECH shouldnbt be regarded as useless bcheck the […]

    July 31, 2017
  • Acalvio Partners with Splunk to Deliver Industrybs First Active Deception-Based Ransomware Solution

    Acalvio Partners with Splunk to Deliver Industrybs First Active Deception-Based Ransomware Solution

    Immediate availability of ShadowPlex-R

    July 20, 2017
  • Donbt be a sitting duck. Make your BreadCrumbs & Lures Dynamic!

    Donbt be a sitting duck. Make your BreadCrumbs & Lures Dynamic!

    BreadCrumbs and Lures are very critical components of any deception based architecture. As the name suggests, breadcrumbs and lures aid to divert a threat a threat actor (an individual or malware) to deception sensors. The moment the deception sensor gets tripped, instead of blocking the multi-stage threat, the threat actor is allowed to execute its […]

    July 10, 2017
  • Reflections on a conferenceb&

    This past week Ibve spent 30 hours in planes and countless more hanging around in security lines, Ibve been heated to the point of melting, tired to the point of sleeping while standing and stressed to the point of immobility (mostly my fault due to not getting all the slides finished until the last minute)b&and […]

    July 1, 2017
  • Technical Analysis of Petya

    Acalvio Threat Research Labs   Petya is the most recent ransomware strain. It originated in Ukraine [1] and is spreading across Europe. This blog summarizes our technical analysis of Petya. Technical Analysis In addition to the encryption and ransomware functionality, the Petya malware has very B aggressive spreading capabilities. The dropper analyzed was a VB6 […]

    June 30, 2017
  • Ransomware: Catch me if you can.

    Ransomware: Catch me if you can.

    Ransomware demand in 2016 was around a billion dollars[1]. B WannaCry[3] was the recent ransomware campaign that spread across 150 countries affecting 200,000 users. It is estimated that in 2017[2], damages due to ransomware will exceed $5 billion. Modern defenses make use of virtualized environments or machine learning algorithms to ensnare the threat actor.B This […]

    June 20, 2017
  • Acalvio to Demonstrate Deception 2.0 Technology at Gartner Security & Risk Management Summit

    Acalvio to Demonstrate Deception 2.0 Technology at Gartner Security & Risk Management Summit

    Innovator in Advanced Threat Defense

    June 12, 2017
  • The Industrybs First bDeception 2.0 for Dummiesb Book

    The Industrybs First bDeception 2.0 for Dummiesb Book

    Since the dawn of time,B deception has been used in nature in various forms as a successful survival strategy and has played an important role in the physical and behavioral adaptations of all organisms.B Humankind, with its higher cognitive ability, has successfully adapted deception to warfare, as a powerful mechanism toB draw an enemy into […]

    May 18, 2017
  • bDeception 2.0 for Dummiesb Examines Fundamentals of Next Generation Deception Technology

    bDeception 2.0 for Dummiesb Examines Fundamentals of  Next Generation Deception Technology

    Acalvio eBook

    May 18, 2017
  • WannaCry Ransomware Analysis: Lateral Movement Propagation

    WannaCry Ransomware Analysis: Lateral Movement Propagation

    Acalvio Threat Research Labs The WannaCry ransomware attack has made front page news around the world, with at least 150 countries and 200,000 customers affected [2]. Because WannaCry makes use of a largely unpatched Windows exploit for lateral movement, it is able to spread rapidly once it penetrates an organizationbs network. In this blog we […]

    May 16, 2017
←Previous Page
1 … 23 24 25 26 27 … 33
Next Page→

Acalvio Staging

Proudly powered by WordPress