We’re going through difficult times, in which a pandemic is hitting the world incredibly hard. Although it’s not the highest concern at the moment, we must consider the economic consequences this outbreak will bring, and its effects on the cybersecurity sector.
“We’re small children at heart: we love taking things apart and putting them back together! Sometimes we can’t put it back together, but that’s all part of the fun.
Many organizations are enthusiastic to adopt threat hunting as part of their cybersecurity arsenal, but in our experience, the key to success is to develop a thorough understanding of the benefits and less-obvious limitations before embarking on any enterprise level threat hunting program.
Deception is a natural fit with threat hunting and threat intelligence gathering: it allows teams to engage with adversaries earlier in the attack sequence that has been defined by the MITRE ATT&CK framework.
[This is part two of a two-part series to describe how CounterCraft deception technology can be used to protect Microsoft Active Directory] In the previous post we talked about the basic concepts behind a typical campaign deployed to protect an Active Directory installation using the CounterCraft Cyber Deception Platform.