Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Deception provides very real value, and we’ve gotten together a list of the biggest benefits of employing deception technology. Read on for our list of the top 10 ways your business can benefit from employing deception techniques as part of its cybersecurity strategy. Read more

    10 Ways Your Business Can Benefit from Deception
  • Categories: , ,

    Learn how deception can help protect OT systems. Gartner recognized CounterCraft as a 2021 Cool Vendor for Cyber Physical Systems. Download the data sheet for more information. Read more

    Improving OT Security {Data Sheet}
  • Categories:

    CounterCraft is thrilled to announce that we will be participating in the MITRE Engenuity ATT&CK Evaluation Trials for deception Read more

    CounterCraft Participates in the MITRE Engenuity ATT&CK Evaluation Trials
  • Categories:

    The founders of CounterCraft talk about how this generation of Docker daemon worms are working. Watch the video Read more

    Docker Daemon Worms | Founder Chat
  • Categories:

    What We’re Reading

    Cybersecurity news in October. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading
  • Categories:

    Gartner recently named CounterCraft a 2021Cool Vendor in the Gartner® Cyber Physical Systems Security report. Being recognized as a Cool Vendor in this sector is a huge validation for the CounterCraft technology and team Read more

    CounterCraft Named a 2021 Gartner® Cool Vendor

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration