Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Talking the Future of Threat Intelligence with CounterCraft CEO, David Brown
In a recent interview with David Brown, the driving force behind strategic alignment at our organization, and CounterCraft partner Bosch CyberCompare, we delved into the latest advances in threat intelligence solutions, focusing on the power of deception technology to deliver specific, actionable intel in real-time. With a wealth of experience in international sales management across… Read more
-
Detected in the Wild – How We Identified A Real Threat Actor Exploiting an Unpatched Fortinet Product
Detected in the Wild – How We Identified A Real Threat Actor Exploiting an Unpatched Fortinet Product Read more
-
The Platform™ v3.4: Now with A New Tool for Reporting Threat Intelligence Incidents
CounterCraft’s Version 3.4 release of The Platform™ introduces several key new features to improve the threat intelligence delivered by our powerful deception technology. Read more
-
Gartner® Recognizes CounterCraft’s Role in Automated Moving Target Defense (AMTD) for Cyber Physical Systems (CPS) Security
ICS security is challenging. See how Red Electrica used deception technology to prevent attacks on their OT systems. Read more
-
Gartner® Recognizes CounterCraft as the Sole Deception Vendor for Cyber-Physical System Security
ICS security is challenging. See how Red Electrica used deception technology to prevent attacks on their OT systems. Read more
-
Categories: Threat Intelligence
{LinkedIn Live} Tech Support, Spies & Nation States: 5 Ways to Stop Insider Threats in Government
A major embarrassment, at best, and a national security threat at worst. The recent case of a 21-year-old Air National Guardsman charged with leaking top-secret U.S. documents shares at least one thing with another famous leaker Edward Snowden: They both worked in government tech support. Insider threat is one of the most difficult threats to… Read more