Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Come take a look inside CounterCraft’s Cyber Deception Platform with our Product Manager, Rich Barrell. From the standardization of EQL to broader coverage for all licenses, the latest version of CounterCraft is full of ease of use improvements. Read more

    A Look into the New Version 2.9
  • Categories:

    CounterCraft’s latest release features a bundle of improvements made with our clients in mind. Version 2.9 is all about refining different aspects of our platform to make them easier to deploy and more user friendly, from further integration EQL to new solutions specific to specialized sectors. Read more

    Making Advanced Active Defense Even Easier to Use with v2.9
  • Categories:

    Meet the team behind CounterCraft’s award-winning deception-powered threat intelligence cyber platform. Today, meet Xabier Eizmendi, our Senior Architect. Read more

    Meet The Crafters: Xabier Eizmendi
  • Categories: , ,

    Big Data vs Right Data

    Harnessing big data can be a powerful tool. But right data can help you identify threat actor behavior much more quickly. Read on to find out. Read more

    Big Data vs Right Data
  • Categories:

    Threat Deception in a Minute highlights just how simple it is to get powerful deception technology set up in your network. Whether you’re a current customer or wondering what it’s like to utilize deception, you’ll find these videos quick, interesting and helpful. Read more

    Alerting Attacker Behavior | Threat Deception in A Minute
  • Categories: ,

    How can organizations implement a defend forward cybersecurity posture? And why is it a good idea? Read this post by Luke Wilson to find out. Read more

    The Business Case for Defend Forward

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration