Tag: deception

  • All Roads Lead to Kubernetes b& and a Stronger Cloud Security Posture

    All Roads Lead to Kubernetes b& and a Stronger Cloud Security Posture

    Enterprise workloads are rapidly migrating from on-prem data centers or private clouds towards public clouds, run by players such as Amazon and Microsoft. While CIOs and IT leaders have been spending the past few years reeling in these individual public cloud islands, it is increasingly becoming clear that enterprise infrastructure is going to be hybrid […]

  • Acalvio Research Shortlisted for Virus Bulletin Award

    Acalvio Research Shortlisted for Virus Bulletin Award

    Virus Bulletin Shortlists Acalvio Research for PC)ter SzEr Award.

  • Rise Above the Fray with The NIST Cybersecurity Framework

    Rise Above the Fray with The NIST Cybersecurity Framework

    Being a CISO these days isnbt easy. The threats are dynamic, the technology hype bewildering, and the expectations from the boss to magically bjust make the problem go awayb unrelenting. One way to help get a grip on this mess is to adopt industry accepted frameworks in which to operate. The idea is to step […]

  • A Game Between Adversary and Defender

    A Game Between Adversary and Defender

    The motivation for this blog is a question that has been circling in my head for a long time, and I have asked this question to many security analysts: Have they played a game with an adversary? or in other words – Have they engaged with an adversary? I got mixed responses. Many security analysts […]

  • Ransomware Command and Control Detection using Machine Learning

    Ransomware Command and Control Detection using Machine Learning

    Authors: Deepak Gujraniya, Mohammad Waseem, Balamurali AR, and Satnam Singh Since the first attack in 1989 [1], ransomware attacks have gained popularity. Especially in 2017, it has created havoc in every possible industry, including the government offices, public-sector departments, and hospitals. Apart from the financial strain that ransomware can bring, it also affects everyday aspects […]

  • CSO Magazine Names ShadowPlex One of Best Security Products

    CSO Magazine Names ShadowPlex One of Best Security Products

    CSO Magazine has named Acalvio’s ShadowPlex as one of theB best security products of the year. CSO specifically cites Acalvio’s ease of use and “unlimited deception assets without constant overhead or maintenance” as value added features. You may read the entireB review of ShadowPlex here. The reviewers performed hands-on evaluations of some of “the most […]

  • Technical White Paper : Using Deception to Detect Spreading Techniques

    Technical White Paper : Using Deception to Detect Spreading Techniques

    The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past threat actors have made use of remote code execution (such […]

  • Three Minutes Until the Apocalypse

    Three Minutes Until the Apocalypse

    [et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”This blog covers three main topics:” _builder_version=”4.7.0″ _module_preset=”default”]This blog covers three main topics: Three Key Questions Needing Answers Within Three Minutes When You Suspect a Breach Using Deception and Endpoint Logs to Backtrack Command and Control Improving SOC Triage Workflow with Prevention Failure Detection [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,3_4″ […]

  • Enterprises Seeking Cyber Deception Solutions – Find Acalvio Listed in rFinderybs Cybersecurity Marketplace

    Enterprises Seeking Cyber Deception Solutions – Find Acalvio Listed in rFinderybs Cybersecurity Marketplace

    Deception is a rapidly growing market and within the expansive market are a plethora of vendors to choose from as you and your team find a vendor to fit your deception security needs. To help organizations find the right vendor for their infrastructure, companies can use rFinderybs cybersecurity marketplace to aid in making buying decisions. […]

  • Spreading Technique used by Retadup Worm.

    Spreading Technique used by Retadup Worm.

    Acalvio Threat Research Lab Retadup worm has been in the news recently. It was first observered infecting Israeli Hospitals [1] and recently it was observered active in South America mining for Crypto Currency[2]. The details of the worm have been published by Trend Labs[1][2].B This blog will share the spreading technique used by the worm […]