Acalvio


One of the oldest techniques for identifying, mapping, and attributing attack methods is deploying honeypots to lure attackers by creating strategically placed fake computing resources. Patterned after the age-old police sting operation, this technique involves deploying traps that appear to be a legitimate part of the infrastructure and contain information […]

Don’t Let Your Distributed Deception Platform Increase Your Risk


If you’re not familiar with the Federal Risk and Authorization Management Program (FedRAMP) Marketplace, it provides a searchable, sortable database of cloud service offerings (CSOs) that have achieved a FedRAMP designation. There are three designations available; FedRAMP Ready, FedRAMP In Process, and FedRAMP Authorized.  The FedRAMP Ready designation indicates a […]

Distributed and Autonomous Deception Techniques Coming to a Federal Agency ...