Resources
NIST’s Expertise on APTs: Gaining Serious Insight – Acalvio
If there's any organization that knows about dealing with advanced persistent threats (APTs) it's NIST. The US government is constantly targeted by the most sophisticated adversaries, and the attacks are directed at both the government agencies themselves, and...
“Amazon Firestick” is to “VCR”, as “Deception” is to _________
Complete the Analogy: “Amazon Firestick” is to “VCR”, as “Deception” is to _________. Correct Answer: “Honeypot” Remember your SAT or ACT exams with the analogy questions? If so you probably got this one right. For those of us old enough to remember, Video...
The Deceptively Simple Shortcut to Visibility
If you’ve ever had a security vendor pitch their wiz-bang internal network threat prevention solution, you’ve probably thought at some point “You’re getting ahead of yourself. First we need to know what’s going on, then we can talk about active controls on the...
Using Deep Learning for Information Security – Part 2
Authors: Santosh Kosgi, Mohammad Waseem, Arunabha Choudhury, and Satnam Singh Deep Learning-based methods have been successfully applied to various computer vision and NLP based problems recently [1]. AI researchers have achieved statistically significant improvements...
Formjacking: Deception is your cure
Formjacking attacks embed JavaScript into ecommerce sites to siphon off credit card data.
Using Deception to effectively fight Ransomware
Deception could be a game changer in terms of detecting Ransomware.
Advancing State of Art in Cloud Malware Detection
Detecting attackers with kubernetes driven deception in cloud-native applications
Deceiving Attackers in a Kubernetes World
Deceiving Attackers in a Kubernetes World
Unified Security in Hybrid Clouds: The Role of Kubernetes & Microservices
Enterprise workloads are rapidly migrating from on-prem data centers or private clouds towards public clouds, run by players such as Amazon and Microsoft. While CIOs and IT leaders have been spending the past few years reeling in these individual public cloud islands,...
Acalvio Research Shortlisted for Virus Bulletin Award
Virus Bulletin Shortlists Acalvio Research for Péter Szőr Award.
Dynamic Deception to address GDPR compliance
GDPR & Deception
Using Deception to Detect and Profile Hidden Threats
Author: Satnam Singh, Chief Data Scientist at Acalvio Technologies How do we detect and profile the adversaries who have already infiltrated and are hiding in the network? To answer this question, we need an approach that can improve the detection and provide more...