Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Deception tech enables you to be one step ahead of attackers. It’s a much more proactive approach to security strategy. Read more

    30 minutes with David Barroso, CEO of CounterCraft
  • Categories: ,

    Our VP of Sales comments that he’s never before seen such rapid adoption of an emerging technology and tells us why deception is a lucrative opportunity for MSSPs and service providers. Read more

    Interview with Raúl Pérez: The State of Play for Business Partnerships
  • Categories:

    CounterCraft 2.0 is live

    The most effective deception technology immerses the attacker in a credible and complex environment in order to deliver increased clarity for the user. Read more

    CounterCraft 2.0 is live
  • Categories: ,

    Cyber attacks are attributed to one criminal group based on some IOCs, the type of tools used by the attackers, or their modus operandi. The truth is that attribution is often difficult to determine. Read more

    How to Fight Threats in the Modern Age
  • Categories:

    The CounterCraft Partner Program is an opportunity for Managed Security Service Providers (MSSPs), service providers and consultancies to offer enhanced protection to end customers with profitable new security services Read more

    CounterCraft launches powerful three-tiered partner program
  • Categories:

    The CounterCraft team are preparing for a busy schedule, with attendance confirmed at a host of excitingevents to capture insights about latest trends in cybersecurity and showcase about cyber deception use cases. Read more

    7 of the best places to get top deception tech insights and meet CounterCraft

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration