Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Everybody is doing it—threat hunting, that is. 88% of CISOs and IT Managers believe that threat hunting is rapidly becoming essential and are including it as part of their cybersecurity strategy. Many organizations have realized, traditional defense mechanisms just aren’t enough and need to shift their security defense approach towards a more proactive defense. As… Read more

    Tool Up Your Threat Hunting With Deception Technology
  • Categories: ,

    According to Gartner, Automated Moving Target Defense (AMTD) solutions will replace at least 15% of traditional detection and response solutions by 2025. That’s a big increase considering these solutions currently make up only 2% of detection and response market share. What exactly is AMTD? And, more importantly, why are organizations starting to implement it?  Take… Read more

    Dynamic Cyber Protection: How Automated Moving Target Defense is Revolutionizing Security
  • Categories:

    A major embarrassment, at best, and a national security threat at worst. The recent case of a 21-year-old Air National Guardsman charged with leaking top-secret U.S. documents shares at least one thing with another famous leaker Edward Snowden: They both worked in government tech support. Insider threat is one of the most difficult threats to… Read more

    {LinkedIn Live} Tech Support, Spies & Nation States: 5 Ways to Stop Insider Threats in Government
  • Categories:

    Cybersecurity News May Edition. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading : May Edition
  • Categories: ,

    The security gap left by XDRs, MDRs, and EDRs is up to 30%. 30%! This is not a small number. Extended Detection and Response (XDR) solutions provide a holistic approach to cybersecurity, thanks to their integration of various cybersecurity solutions from different sources. But without behavior patterns from previous attacks, there’s no way to automatically… Read more

    Mind the Gap! Why You Should Add Deception into Your XDR Strategy
  • Categories: ,

    The federal government and military sectors are continuously under cyber attack by sophisticated and nation-state threat actors. New threats are discovered every day, which means your organization needs the most advanced detection and response capabilities available as well as custom cybersecurity solutions. Governments have a unique set of challenges that necessitates unique solutions. They are… Read more

    Cybersecurity for Governments: 3 Use Cases for Deception-Based Active Defense

Top resources.

  • Webinars

    Technical Evidence of Attacks on Ukrainian Government Infrastructure

  • Ebook

    Are You Ready for Deception Technology?

  • Ebook

    Inside the Mind of the Enemy / Profiling Cyber Adversaries

  • Datasheet

    ActiveBehavior™

  • Datasheet

    Deception Techniques for Every Stage of A Cyber Attack

  • Datasheet

    Active Defense: The Tech Behind The Platform™

  • Ebook

    Digital Twin: Finding the Digital Adversary Before They Find You

  • Webinars

    Destroying the Barrier to Sophisticated Detection and Response

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration