Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Why Threat Intel is Broken

    The purpose of threat intelligence is to gather information that helps you understand an attacker so that you can proactively take action against them. The current generic threat intel won’t help get you to that goal. Deception will. 100 character intro: Generic threat intel just isn’t enough to keep systems secure. Read more

    Why Threat Intel is Broken
  • Categories:

    Threat Deception in a Minute highlights just how simple it is to get powerful deception technology set up in your network. Whether you’re a current customer or wondering what it’s like to utilize deception, you’ll find these videos quick, interesting and helpful. 100 character intro: See just how simple it is to get powerful deception… Read more

    How to Activate ActiveBehavior | Threat Deception in A Minute
  • Categories: ,

    Industrial Control Systems (ICS) have many unique characteristics that make defensive countermeasures against cyber attacks a challenging job. Cyber deception can be a great way to protect these assets without imposing any burden on the normal operation of services. Read more

    Deception for Industrial Control Systems
  • Categories: ,

    The founders of CounterCraft chat about IoCs—what they are, how they can be used and when they can be trusted. Watch the video ‘The Truth About IoCs’ for insight into the world of IoCs. Read more

    The Truth About IoCs | Founder Chat
  • Categories:

    What You Don’t Know…

    Learn the importance of cybersecurity and the value of deception with this story about a chicken farm and a fox by Marta Fernandez. Read more

    What You Don’t Know…
  • Categories:

    Meet the team behind CounterCraft’s award-winning deception-powered threat intelligence cyber platform. Today, meet Rich Barrell, our Product Manger. Read more

    Meet The Crafters: Rich Barrell

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration