Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    What We’re Reading

    Cybersecurity news in March. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading
  • Categories: , ,

    If you have been following our blog, you already know that we are big fans of the MITRE ATT&CK framework. ATT&CK has become the de-facto framework for describing attacker tactics, techniques and procedures (TTPs). Another MITRE framework that we really love is MITRE Engage, a framework built to describe the different approaches and activities for engaging with adversaries.… Read more

    Mapping ATT&CK techniques to Engage activities
  • Categories:

    Visibility is key to stopping sophisticated threat actors. Here are the three strategic points you should cover to ensure you can detect attackers and protect your network from them. Read more

    Stopping Sophisticated Threat Actors: 3 Things You Should Be Doing
  • Categories:

    The founders of CounterCraft talk about the recent Lapsus$ hack of Okta. Watch the video Read more

    Cyber CEOs React to Lapsus$ Hack
  • Categories: , ,

    Learn how deception is uniquely positioned to help protect financial services. Download the data sheet for more information. Read more

    Deception-Powered Threat Intelligence for Financial Services {Data Sheet}
  • Categories: ,

    Generic threat intel wastes a lot of time. As technology evolves, so does the threat actor. Threats and techniques change on a daily basis, making the job of the cyber defender incredibly difficult. Our approach to threat intel is the use of deception technology to collect real-time threat intel specific to your environment. This is… Read more

    The Threat Intelligence Lifecycle 2.0

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration