Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    What We’re Reading

    Cybersecurity news in February. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: ,

    For that reason, it is vital for businesses to keep their attackers on the left side of the kill chain, ideally in the Recon phase. In this video, our Head of Cyber Threat Intelligence, Nahim Fazal, enumerates the many reasons controlling the attackers’ position on this kill chain can give businesses a cutting edge in… Read more

    The Cyber Kill Chain and What You Need to Know
  • Categories: ,

    Deception in the Data Center

    A data center is a prime target for cyber attackers, so it is important to have a strong cyber defense in place. Deception technology is a useful technique for keeping a data center safe. Deception can help detect intruders quickly and prevent downtime, lowering business cost and mitigating risk. Read more

    Deception in the Data Center
  • Categories: , ,

    MTTD stands for Mean Time to Detection. This is a vital KPI for security teams, CISOs, and everyone in cybersecurity. Found out more about this KPI, from how to calculate it to how to lower it. Read more

    What is MTTD? Everything You Need to Know About MTTD, Explained
  • Categories:

    Solar Winds was the cybersecurity event of the decade. In this Founder Chat, we talk about its wide-reaching effects and how deception would have stopped it dead in its tracks. Read more

    It’s Still Going…Solar Winds Fallout | Founder Chat
  • Categories:

    The two key challenges and why UK businesses look to cyber deception as a solution. Read as our UK Channel Manager delves into the subject of deception technology in the United Kingdom. Read more

    In Conversations With UK Businesses

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration