Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
{Webinar} EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More
EDR—the cybersecurity solution that is a vast improvement over mere endpoint protection and anti-virus solutions….right? Well, there is one small hitch—EDR is a reactive approach. EDR tools function on a reliance of behavioral analysis, meaning the attacks have already happened and now your team has to race against time to remediate them. EDR avoidance is […] Read more
-
Dynamic Cyber Protection: How Automated Moving Target Defense is Revolutionizing Security
According to Gartner, Automated Moving Target Defense (AMTD) solutions will replace at least 15% of traditional detection and response solutions by 2025. That’s a big increase considering these solutions currently make up only 2% of detection and response market share. What exactly is AMTD? And, more importantly, why are organizations starting to implement it? What […] Read more
-
Categories: Threat Intelligence
{LinkedIn Live} Tech Support, Spies & Nation States: 5 Ways to Stop Insider Threats in Government
A major embarrassment, at best, and a national security threat at worst. The recent case of a 21-year-old Air National Guardsman charged with leaking top-secret U.S. documents shares at least one thing with another famous leaker Edward Snowden: They both worked in government tech support. Insider threat is one of the most difficult threats to […] Read more
-
Cybersecurity for Governments: 3 Use Cases for Deception-Based Active Defense
The federal government and military sectors are continuously under cyber attack by sophisticated and nation-state threat actors. New threats are discovered every day, which means your organization needs the most advanced detection and response capabilities available as well as custom cybersecurity solutions. Governments have a unique set of challenges that necessitates unique solutions. They are […] Read more
-
Threat Intel vs. Adversary-Generated Threat Intel : What’s the Difference?
Threat intelligence used to be the domain of a few cybersecurity analysts who spent their time tracking global bad actors and piecing together knowledge of their tactics, techniques, and procedures (TTPs). Today, any organization can subscribe to threat intelligence services and feeds, using the data to predict and identify threats targeting their business. The numerous […] Read more
-
Attack Trees : An Essential Tool for Cyber Threat Modeling
Complexity. Threat analysts work with lots of data and need powerful tools to navigate and restructure it into specific narratives. They also need dashboards that convey status at a glimpse for a more agile and actionable workflow, no matter how complex the system is. But more complexity and data doesn’t mean bigger tables and shinier […] Read more