Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

What We're Reading

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

28 Apr

The Anatomy of a Cyber Attack

READ MORE

When you break down a cyber attack, you find patterns and actions that are commonplace. Every cyber attack consists of various stages, from pre-breach to the moment of impact.

22 Apr

Why Threat Intel is Broken

READ MORE

As a security analyst, we’ve all been there before. You’re getting ready for work, scroll the news, and notice that a new breach was discovered at a company that’s not even in your industry.

20 Apr

How to Activate ActiveBehavior | Threat Deception in A Minute

READ MORE

Our team works constantly to make the CounterCraft Cyber Deception Platform easy and intuitive to use. Many of the functions of the Cyber Deception Platform can be deployed with just a few clicks of the mouse.

15 Apr

Deception for Industrial Control Systems

READ MORE

Attackers only have to be lucky once. Defenders have to be lucky every time. Industrial Control Systems (ICS) have many unique characteristics that make defensive countermeasures against cyber attacks a challenging job.

14 Apr

The Truth About IoCs | Founder Chat

READ MORE

CounterCraft’s founders talk about Indicators of Compromise, or IoCs. Can you trust them? What’s the key to using IoCs? The problem is, oftentimes, IoCs like IP addresses or domain names are old and out of date.

Page 32 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE