Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Since the start of the Internet, honeypots have been a very valuable defensive strategy. No matter how simple or complex they are, they definitely add a lot of value to your security posture. Clifford Stoll and his marvelous book The Cuckoo’s Egg is always referenced as one of the first deception use cases in cybersecurity,… Read more

    Why Credibility is Key: The Truth about Honeypots
  • Categories: ,

    Find Out How CounterCraft Delivers Actionable Adversary-Generated Threat Intelligence Read more

    {VIDEO} How CounterCraft Delivers Actionable Adversary-Generated Threat Intelligence
  • Categories: ,

    ICS security is challenging. See how Red Electrica used deception technology to prevent attacks on their OT systems. Read more

    {Datasheet} ICS Security : Protecting OT Systems with Active Defense
  • Categories: ,

    Stay One Step Ahead with Adversary-Generated Threat Detection Read more

    {VIDEO} Stay One Step Ahead with Adversary-Generated Threat Detection
  • Categories: , , ,

    ICS security is challenging. See how Red Electrica used deception technology to prevent attacks on their OT systems. Read more

    Gartner® Recognizes CounterCraft’s Role in Automated Moving Target Defense (AMTD) for Cyber Physical Systems (CPS) Security
  • Categories: ,

    Define your organizational zero trust strategy armed with deception technology to prevent breaches and gain powerful adversary threat intelligence. Read more

    {Datasheet} Cloud Security and Deception Technology
  • Categories: , ,

    Define your organizational zero trust strategy armed with deception technology to prevent breaches and gain powerful adversary threat intelligence. Read more

    {Whitepaper} The Ultimate Guide to Zero Trust & Deception Technology

Top resources.

  • Datasheet

    The Edge™ – Spear Phishing

  • Webinars

    Amenazas Actuales en Infraestructuras Críticas

  • Datasheet

    The Edge™ – External Attack Surface Management

  • Webinars

    Remote Access & VPN Risks in the New Cybersecurity Scenario and Functionality

  • Datasheet

    The Edge™ – Ransomware

  • Datasheet

    The Pulse™

  • Datasheet

    The Platform™

  • Datasheet

     Active Defense for Oil & Gas

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration