Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
The Anatomy of a Cyber Attack
Every cyber attack consists of various stages, from pre breach to the moment of impact. We believe every stage is an opportunity to trip up and trap cyber criminals. Keep reading to get a breakdown of the stages of a typical cybersecurity incident.100 character intro: An infographic that shows how a typical cybersecurity incident unfolds. Read more
-
Why Threat Intel is Broken
The purpose of threat intelligence is to gather information that helps you understand an attacker so that you can proactively take action against them. The current generic threat intel won’t help get you to that goal. Deception will. 100 character intro: Generic threat intel just isn’t enough to keep systems secure. Read more
-
The Truth About IoCs | Founder Chat
The founders of CounterCraft chat about IoCs—what they are, how they can be used and when they can be trusted. Watch the video ‘The Truth About IoCs’ for insight into the world of IoCs. Read more
-
Can You Trust Your IoCs?
Context is key to an IoC. If your lockpiled IoCs are outdated or have no context, they are useless. So are IoCs still valid? Read this post by CEO and founder David Barroso to find out the answer. Read more
-
Defend Forward, Part One
Defend forward is a posture that seeks to gain early understanding and warnings of attacker activity, instead of waiting for a breach to happen and then dealing with the consequences. Should organizations today use it as the blueprint to their cybersecurity strategy? Read more
-
Real World Cases: Threat Intel to Detect Insider Threats
See the success our clients have found detecting and managing insider threat, one of the most challenging security issues. CounterCraft’s deception-powered threat intelligence platform deploys deception environments that trick insiders into exposing their movements. Read more