Acalvio Technologies
Acalvio Technologies
  • Видео 26
  • Просмотров 6 560
MITRE Engage - The Role of Adversary Engagement
MITRE Engage is a framework for planning and discussing adversary engagement operations. Engage challenges our traditional cyber security mindset and asks defenders to see the adversary as a human, vulnerable to manipulation, influence, and detection.
Engage helps defenders expose malicious activity, negatively affect those operations, and elicit timely, contextualized, and relevant Cyber Threat Intelligence (CTI). Overall, Engage seeks to enable defenders to drive up the costs while driving down the value of malicious operations to protect our organizations.
Join this insightful webinar with MITRE Engage lead to learn more about:
*Why is adversary engagement essential for cyber defense?
*How...
Просмотров: 101

Видео

The Rising Risk of Insider Threats: Strategies for Cyber Defense
Просмотров 983 месяца назад
Insider threats continue to rise, with the increased adoption of cloud services and remote work making it easier for insiders to access sensitive data. Traditional security controls are proving to be insufficient to stop this escalating threat. Watch this on-demand webinar with cybersecurity experts to learn more about: How have insider threats evolved? What makes the detection of insider threa...
ShadowPlex Advanced Threat Defense
Просмотров 913 месяца назад
AI-enhanced deception provides early and precise detection to protect IT, OT, and Cloud.
Acalvio Honeytokens for CrowdStrike
Просмотров 483 месяца назад
Acalvio Honeytokens are designed to detect even zero-day threats and are the perfect solutions to deploy in zero-trust environments for Identity Protection.
The Evolving Ransomware Threat - Rob Wood, Ex-CISO of CMS
Просмотров 484 месяца назад
Ransomware threats have evolved, with modern ransomware combining human intelligence with sophisticated automation. Ransomware as a service (RaaS) affiliates leverage stealthy, custom ransomware variants that evade traditional security solutions. The recent Alphv/BlackCat ransomware attacks on healthcare highlight the need for a comprehensive defense strategy. Watch this on-demand webinar with ...
The Evolving Threat Landscape: The Role of Deception Technology - A GigaOM Radar Analysis
Просмотров 1666 месяцев назад
As cyberattacks become increasingly sophisticated and stealthy, 2023 witnessed an unprecedented surge in security breaches. The trend shows no signs of slowing down, with 2024 poised to set new records, especially with high-profile ransomware and APT (Advanced Persistent Threat) incidents targeting major organizations. In response to the mounting cyber threats, GigaOm has carried out extensive ...
Acalvio Honeytokens Solution for CrowdStrike Identity Protection.
Просмотров 878 месяцев назад
Identity-driven attacks are serious threats that compromise corporate and personal information. They are hard to detect with traditional cybersecurity approaches. Honeytoken accounts and Honeytokens are Deception Technology artifacts. Honeytoken accounts are deceptive accounts created in Active Directory (AD). Honeytokens are deceptive credentials embedded in endpoints and cloud workloads. Any ...
Protecting Healthcare Organizations Through Deception Technology: A Practitioner’s View
Просмотров 1288 месяцев назад
Watch this engaging Health-ISAC webinar with Doug J. Spangler, Sr. Analyst of Cyber Threat Intelligence at Trinity Health. Doug will cover insights and best practices based on his 24 years of solid hands-on experience integrating advanced cyber solutions including deception technologies solutions from Acalvio at Trinity Health. *The threat vectors and use cases that drove the deployment of dece...
Accelerating Zero Trust Through Deception Based Active Defense
Просмотров 1129 месяцев назад
Watch the recorded webinar with an insightful discussion to learn about the Active Defense proactive approach to cybersecurity, empowering organizations to predict attackers' actions, strategically set traps, and closely monitor attacker interactions. Zero Trust, a strategy and architectural principle, ensures exclusive access to critical applications and data for authorized users. The integrat...
Enterprise-scale Honeytokens for CrowdStrike Identity Protection
Просмотров 40710 месяцев назад
CrowdStrike threat hunting report 2023 highlights that over 80% of all breaches involve the use of compromised credentials. Identity-based attacks target identity infrastructure and endpoints to gain access to credentials. Traditional security solutions are unable to distinguish between legitimate and malicious use of credentials. Watch the recording of this webinar with identity protection and...
Ram Varadarajan, CEO and Co-founder of Acalvio Technologies Black Hat USA 2023
Просмотров 50Год назад
Ram Varadarajan, CEO and Co-founder of Acalvio Technologies, talks about Active Defense, Deception Technology and how Acalvio can help defend against advanced threats with precision and speed.
Admiral Winnefeld on Deception Technology
Просмотров 226Год назад
In this video, former Vice Chairman of the Joint Chiefs of Staff Admiral James “Sandy” Winnefeld discusses the value of deception technology.
Acalvio - The Leader in Deception Technology
Просмотров 103Год назад
Deception has been used for winning against adversaries since the ancient days. Cyber is the new battleground and our enemies know how to breach the our perimeter defenses. With traditional cyber defense, the adversary only needs to be right once..We (Defender) must get it right all the time, and the threat actor must get it right only once. Deception turns this asymmetry on its head to our ben...
Industry’s First Enterprise-scale Honeytokens For Identity Protection
Просмотров 200Год назад
Recent CrowdStrike research highlighted a massive spike in identity-based attacks last year, and 80% of all breaches involve compromised identities. Identity-based attacks target Active Directory, Azure AD, SSO, Password Managers, cached credentials on Windows endpoints, etc. Did you know? *There are 24 billion stolen credentials available for sale on the darknet *Colonial Pipeline and the Uber...
Acalvio Cyber Deception Solution
Просмотров 71Год назад
Deception is a new threat detection mechanism that complements existing cybersecurity solutions. Quickly, precisely, and easily detect, engage, and respond to malicious activity in cloud and on-premises networks with Acalvio’s patented Active Defense Platform. Protecting all network devices and hybrid networks, Acalvio is built natively on Google Cloud and leverages Google services such as Goog...
Acalvio ShadowPlex Ransomware Protection
Просмотров 169Год назад
Acalvio ShadowPlex Ransomware Protection
Acalvio ShadowPlex Identity Protection
Просмотров 223Год назад
Acalvio ShadowPlex Identity Protection
Acalvio ShadowPlex Cyber Deception for Cloud
Просмотров 258Год назад
Acalvio ShadowPlex Cyber Deception for Cloud
Acalvio Honeytoken Accounts and Honeytokens for CrowdStrike Identity Protection.
Просмотров 774Год назад
Acalvio Honeytoken Accounts and Honeytokens for CrowdStrike Identity Protection.
Acalvio Honeytoken Accounts and Honeytokens for CrowdStrike Falcon® Identity Protection
Просмотров 53Год назад
Acalvio Honeytoken Accounts and Honeytokens for CrowdStrike Falcon® Identity Protection
Deception Strategy in Zero Trust Environments
Просмотров 194Год назад
Deception Strategy in Zero Trust Environments
Active Defense Against Cyber Threats with Acalvio Technologies
Просмотров 1 тыс.Год назад
Active Defense Against Cyber Threats with Acalvio Technologies
Acalvio CrowdStrike Threat Hunting Sales Intro
Просмотров 1,2 тыс.4 года назад
Acalvio CrowdStrike Threat Hunting Sales Intro
D3 - Drinks, Drones & Deception Party Promo
Просмотров 1937 лет назад
D3 - Drinks, Drones & Deception Party Promo
Acalvio RSA 1 min
Просмотров 3067 лет назад
Acalvio RSA 1 min
Acalvio Introduction to Deception 2.0
Просмотров 2188 лет назад
Acalvio Introduction to Deception 2.0