Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    In part one, we talked about how the technology deployed to deal with the insider threat, such as cyber deception, must deter, detect, and disrupt. Here we address rules two and three: Threat Types and Threat Activities. Read more

    Why Every CISO Needs to Track Insider Threats More Proactively, Part II
  • Categories: ,

    Last week, CounterCraft attended the Gartner Security & Risk Management Summit. These are some of the key points we took away from Pete Shoard’s presentation, that answer some of the questions you might have about cyber deception. Read more

    Cyber Deception Should Be Part of Your Threat Detection Strategy
  • Categories: ,

    Cyber deception can be deployed to deal with insider threats effectively and rapidly. How does it relate to Gartner’s “rule of three”? Read more

    Why Every CISO Needs to Track Insider Threats More Proactively
  • Categories: ,

    MITRE has released Shield this August to great community approval. Shield is the defensive partner to the well known ATT&CK matrix that defines threat actor activity. Shield is a set of defensive techniques that defend and protect against specific threat actor actions. Read more

    Active Defense with MITRE Shield
  • Categories: ,

    With cyber deception, you can take advantage of your knowledge about your assets and network, information that your adversaries don’t have, to build a more resilient security architecture. Read more

    Cyber Deception, Tailor-Made Defense Based on Your Insight
  • Categories: ,

    Deception technology can be used to add zero impact security and gather valuable first-hand threat intelligence on those who are targeting your OT systems, with no risk to business continuity. Read more

    Boosting OT Security with Cyber Deception

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration