Acalvio


One of the oldest techniques for identifying, mapping, and attributing attack methods is deploying honeypots to lure attackers by creating strategically placed fake computing resources. Patterned after the age-old police sting operation, this technique involves deploying traps that appear to be a legitimate part of the infrastructure and contain information […]

Don’t Let Your Distributed Deception Platform Increase Your Risk


If you’re not familiar with the Federal Risk and Authorization Management Program (FedRAMP) Marketplace, it provides a searchable, sortable database of cloud service offerings (CSOs) that have achieved a FedRAMP designation. There are three designations available; FedRAMP Ready, FedRAMP In Process, and FedRAMP Authorized.  The FedRAMP Ready designation indicates a […]

Distributed and Autonomous Deception Techniques Coming to a Federal Agency ...


Deception is a breach detection tactic that utilizes decoys and misinformation to divert and delay an adversary.  As part of your overall cybersecurity strategy, this tactic gives the SOC / IR teams sufficient time to perform remediation before an adversary can complete their mission.  Deception is not generally used to […]

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker ...