Subscribe for updates—fresh insight delivered to your inbox.
What We're Reading
When you break down a cyber attack, you find patterns and actions that are commonplace. Every cyber attack consists of various stages, from pre-breach to the moment of impact.
As a security analyst, we’ve all been there before. You’re getting ready for work, scroll the news, and notice that a new breach was discovered at a company that’s not even in your industry.
Our team works constantly to make the CounterCraft Cyber Deception Platform easy and intuitive to use. Many of the functions of the Cyber Deception Platform can be deployed with just a few clicks of the mouse.
Attackers only have to be lucky once. Defenders have to be lucky every time. Industrial Control Systems (ICS) have many unique characteristics that make defensive countermeasures against cyber attacks a challenging job.
CounterCraft’s founders talk about Indicators of Compromise, or IoCs. Can you trust them? What’s the key to using IoCs? The problem is, oftentimes, IoCs like IP addresses or domain names are old and out of date.