Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

What We're Reading

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

1 Feb

Profiling Adversaries: What is the Motive of the Cyber Criminal?

READ MORE

Profiling adversaries is a common strategy in the world of crime, but it can also apply to cyber criminals. With a good criminal profile, you’re building a card that has the tools, techniques and procedures that an adversary is using.

27 Jan

{Ebook} Inside the Mind of the Enemy: A Guide to Profiling Cyber Criminals

READ MORE

“The opportunity to secure ourselves against defeat lies in our own hands, but the opportunity of defeating the enemy is provided by the enemy himself.

19 Jan

Deception Isn’t Plug and Play

READ MORE

Deception in cybersecurity offers a way to catch insider threats, a way to get alerts that are virtually 100% accurate, and a way to receive real time threat intel on your attack surface.

13 Jan

Cobalt Strike Explained—What it is and How to Detect it | Founder Chat

READ MORE

Cobalt Strike is a penetration testing tool that allows attackers to deploy beacons on a victim’s machine. It is used in the post-exploitation stage, and it allows attackers to move laterally, escalate privileges, and other useful actions.

12 Jan

CounterCraft Threat Intel Software and Services on GSA Schedule

READ MORE

Today, we’re proud to share that CounterCraft’s Cyber Deception Platform and expert threat intelligence services are now available on iGov’s GSA Schedule and GSA Advantage.

Page 14 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE