Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    What We’re Reading

    Cybersecurity news in July. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading
  • Categories: , ,

    The Cybersecurity and Infrastructure Security Agency (CISA) and the Transportation Security Administration (TSA) have defined a series of actions that pipeline operators can take to improve their cybersecurity posture and mitigate their exposure to common risks.Deception techniques can help in mitigating the risks identified by the CISA and TSA teams. This blog shows how CounterCraft… Read more

    Meeting TSA Pipeline Security Guidelines with Cyber Deception
  • Categories: ,

    The changing threat landscape globally continues to necessitate new solutions, and cyber deception fills the gaps left by more traditional cybersecurity tools. By demonstrating the increase in detection and coverage, a team can justify the spend on deception technology. Here are three reasons adopting cyber deception now is a good idea for your organization Read more

    Three Reasons You Need Cyber Deception Now
  • Categories: ,

    Download our ebook today to learn all about insider threat and how to stop it Read more

    {Ebook} Cyber Deception for Insider Threats: What You Need to Know
  • Categories:

    In our webinar about a step-by-step BPFDoor vulnerability, we discussed a compromise step-by-step with Nicole Carignan, CounterCraft Customer Success Manager, and David Barroso, CEO. Here you have the IOCs and other intel gathered by our deception tool. Read more

    IOCs, Intel, and Additional Resources from the BPFDoor Compromise
  • Categories: , ,

    With the implementation of the new European NIS2 directive right around the corner, it’s essential that organizations that fall under the directive are prepared. Keep reading to better understand what the NIS2 directive is, what organizations can do to prepare for this change in how cybersecurity is handled, and how cyber deception can help with… Read more

    How to Boost NIS2 Compliance Efforts in Six Important Categories

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration