Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Holiday ransomware attacks are a real threat to the retail industry. E-commerce security best practices can improve retail industry cybersecurity. Learn how deception is uniquely positioned to help protect retail and e-commerce organizations from ransomware Read more

    Holiday Ransomware Attacks: How to Improve Retail Cybersecurity
  • Categories:

    CounterCraft will be at several cybersecurity events across the globe this fall Read more

    Cybersecurity Events 2022: Where to Find Us
  • Categories: , ,

    The oil & gas industry has come under serious attack in recent years. Learn how deception is uniquely positioned to help protect the oil & gas sector Read more

    The Evolving Threat to Oil & Gas
  • Categories:

    CounterCraft integrates with all your favorite security software, as well as the communication tools your team uses. Learn about our integration with Elastic Read more

    CounterCraft Integrates With… Elastic
  • Categories: , ,

    Insider threats are especially difficult to detect because the threat actor is already in the network. Find out some real ways to protect against insider threat. Read more

    4 Real Ways to Prevent, Detect and Defend Against Insider Threat
  • Categories:

    What We’re Reading

    Cybersecurity news in August. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration