Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: , ,

    According to Verizon’s latest data breach report1, 70% of attacks are perpetrated by external threat actors. Lack of visibility into external attack surface assets and vulnerabilities is one of the main obstacles global banks face when trying to protect their perimeter effectively. Our cyber deception platform offers one of the best technologies for dealing with… Read more

    External Attack Surface Management with Digital Twins : A Case Study
  • Categories:

    What We’re Reading

    Cybersecurity news in February. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: ,

    Complexity. Threat analysts work with lots of data and need powerful tools to navigate and restructure it into specific narratives. They also need dashboards that convey status at a glimpse for a more agile and actionable workflow, no matter how complex the system is. But more complexity and data doesn’t mean bigger tables and shinier… Read more

    Attack Trees : An Essential Tool for Cyber Threat Modeling
  • Categories:

    Creating and launching a new website is one of the most important (and stressful!) projects a marketing team can undertake. More often than not, a new site accompanies a revamp of a brand’s identity, a critical labor of love that most marketers only get a chance to do a few times ever in a career.… Read more

    One Step Ahead : CounterCraft Launches New Website and Brand Identity
  • Categories:

    What We’re Reading

    Cybersecurity news in February. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: ,

    Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s where advanced detection and response comes in. When your organization has real-time, adversary-generated threat intelligence, it makes it easy to cut through the fog of data and get a concrete idea of… Read more

    {Webinar} Destroying the Barrier to Sophisticated Detection and Response

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration