3 Apr

Threat Intelligence: Do You Have All You Need? Do You Need All You Have?


We’re going through difficult times, in which a pandemic is hitting the world incredibly hard. Although it’s not the highest concern at the moment, we must consider the economic consequences this outbreak will bring, and its effects on the cybersecurity sector.

9 Sep

How deception is closing the gap: interview with CounterCraft Product Manager, Richard Barrell


“We’re small children at heart: we love taking things apart and putting them back together! Sometimes we can’t put it back together, but that’s all part of the fun.

22 May

Key benefits of using deception for threat hunting plus use cases


Many organizations are enthusiastic to adopt threat hunting as part of their cybersecurity arsenal, but in our experience, the key to success is to develop a thorough understanding of the benefits and less-obvious limitations before embarking on any enterprise level threat hunting program.

29 Mar

Tool Up Your Threat Hunting Team with Deception Technology


Deception is a natural fit with threat hunting and threat intelligence gathering: it allows teams to engage with adversaries earlier in the attack sequence that has been defined by the MITRE ATT&CK framework.

22 Jan

Using Deception to Protect Active Directory Pt. 2


[This is part two of a two-part series to describe how CounterCraft deception technology can be used to protect Microsoft Active Directory] In the previous post we talked about the basic concepts behind a typical campaign deployed to protect an Active Directory installation using the CounterCraft Cyber Deception Platform.

Page 13 of 15