Logo of Acalvio, a leading company in cyber deception technology
Deception Tech in Healthcare: Addressing Device Risks – Acalvio

Deception Tech in Healthcare: Addressing Device Risks – Acalvio

Healthcare institutions are heavily targeted by cyber attackers. The critical services these institutions provide, the volume of sensitive data they handle, the mix of IT and OT infrastructure, and unpreparedness make healthcare institutions very attractive and...
MITRE ATT&CK Use Cases for Cybersecurity

MITRE ATT&CK Use Cases for Cybersecurity

As discussed in this whitepaper, the MITRE ATT&CK framework is a critical technology resource that can help you systematically evaluate your security measures against the potential threats you may encounter. Understanding the weaknesses in your current...
Hacking Back With The Active Cyber Defense Certainty Act

Hacking Back With The Active Cyber Defense Certainty Act

H.R. 3270 …also known as the Active Cyber Defense Certainty Act (ACDC), will, if it becomes law, allow victims of hacking to execute self-defense outside of their networks. The essence of this bill was originally introduced in 2017 as H.R. 4036, which...
Understanding Anomalous Behavior and Malicious Intent

Understanding Anomalous Behavior and Malicious Intent

Malicious behavior: we generally know it when we see it Most of the time, unfortunately, malicious behavior is hidden from view. Consider that the average dwell time for cyberattackers within networks is still measured in months. Per FireEye, the global median dwell...
Guarding Industrial Systems: Debunking Three Cyber Myths

Guarding Industrial Systems: Debunking Three Cyber Myths

The Threat to ICS in Context Industrial control systems (ICS) are the key infrastructure targets for nation-state attackers and fringe bad actors seeking to compromise or destroy public utilities and manufacturing industry operations. In some cases simple tools such...
Loading...