Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Black Hat is back! Read about what to see at the 2021 Black Hat Conference here. Read more

    Meet The Crafters: Marti Buckley
  • Categories: ,

    CounterCraft goes to great lengths to make sure our platform is the most secure in the industry. Read on to find out what we do to make sure our platform is a safe base for your deception-powered threat intelligence. Read more

    Is the CounterCraft Platform Secure?
  • Categories:

    CounterCraft integrates with all your favorite security software, as well as the communication tools your team uses. Learn about our integration with Splunk. Read more

    CounterCraft Integrates With… Splunk
  • Categories: , ,

    This infographic breaks down the stages of a typical cybersecurity incident and shows you how to stop it. Read more

    {INFOGRAPHIC} The Anatomy of a Cyber Attack
  • Categories:

    What We’re Reading

    Cybersecurity news in April. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: , ,

    The Anatomy of a Cyber Attack

    Every cyber attack consists of various stages, from pre breach to the moment of impact. We believe every stage is an opportunity to trip up and trap cyber criminals. Keep reading to get a breakdown of the stages of a typical cybersecurity incident.100 character intro: An infographic that shows how a typical cybersecurity incident unfolds. Read more

    The Anatomy of a Cyber Attack

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration