Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.
Highlights.
-
Categories: Deception Technology
Cybersecurity news in July. Click through to find out what our team of experts was reading and talking about this month Read more
-
The Cybersecurity and Infrastructure Security Agency (CISA) and the Transportation Security Administration (TSA) have defined a series of actions that pipeline operators can take to improve their cybersecurity posture and mitigate their exposure to common risks.Deception techniques can help in mitigating the risks identified by the CISA and TSA teams. This blog shows how CounterCraft… Read more
-
The changing threat landscape globally continues to necessitate new solutions, and cyber deception fills the gaps left by more traditional cybersecurity tools. By demonstrating the increase in detection and coverage, a team can justify the spend on deception technology. Here are three reasons adopting cyber deception now is a good idea for your organization Read more
-
Download our ebook today to learn all about insider threat and how to stop it Read more
-
Categories: Threat Intelligence
In our webinar about a step-by-step BPFDoor vulnerability, we discussed a compromise step-by-step with Nicole Carignan, CounterCraft Customer Success Manager, and David Barroso, CEO. Here you have the IOCs and other intel gathered by our deception tool. Read more
-
With the implementation of the new European NIS2 directive right around the corner, it’s essential that organizations that fall under the directive are prepared. Keep reading to better understand what the NIS2 directive is, what organizations can do to prepare for this change in how cybersecurity is handled, and how cyber deception can help with… Read more