Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    What We’re Reading

    Cybersecurity news in July. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: ,

    Threat Deception in a Minute highlights just how simple it is to get powerful deception technology set up in your network. This edition features how to utilize the powerful MITRE ATT&CK platform. Whether you’re a current customer or wondering what it’s like to utilize deception, you’ll find these videos quick, interesting and helpful. Read more

    Leveraging MITRE ATT&CK | Threat Deception in A Minute
  • Categories:

    Meet the team behind CounterCraft’s award-winning deception-powered threat intelligence cyber platform. Today, meet Shunta Sanders, our Senior Solutions Architect. Read more

    Meet The Crafters: Shunta Sanders
  • Categories:

    CounterCraft officially complies with the rigorous ISO27001 standards that measusre legal, physical and technical risk management. Read more

    CounterCraft Receives ISO 27001 Certification
  • Categories:

    CounterCraft’s mission is to be a pioneering provider of cyber deception and real time threat intelligence that detects targeted attacks. Our vision hasn’t changed since the beginning. Learn about our approach here. Read more

    Our Vision, from the Founders of CounterCraft
  • Categories: ,

    One of the most useful operating features of Countercraft’s Cyber Deception Platform is the capability to provide multi-tenant capabilities out of the box. Organizations need deception technology, and multitenancy delivers it—without the hassle. Read more

    Cyber Deception as a Service: Multitenancy and MSSPs

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration