Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

What We're Reading

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

10 Aug

Boosting OT Security with Cyber Deception

READ MORE

The aim of this article is to present a couple of use cases where deception technologies can be used to provide an extra dimension to Operational Technology (OT) networks.

28 Jul

Detect Threats Earlier with CounterCraft’s Threat Intelligence Services

READ MORE

Stop cyber threats in their tracks and protect your remote workforce with the all new CounterCraft’s Threat Intelligence Services. These services-as-a-service go live to offer the kind of rapid support organizations are now seeking having been forced to adopt widespread remote working amidst the COVID-19 crisis – simply plug and play this cloud-based managed service to proactively protect the networks your colleagues and operations now rely on.

20 Jul

Am I Ready for Cyber Deception? Gartner Hype Cycle for Security Operations.

READ MORE

Gartner has released its Hype Cycle for Security Operations 2020 report. It is a thought-provoking read, spanning a diverse range of technologies. What I want to focus on here is the report’s approach to deception, where it stands in the hype cycle and how the level of maturity in your security operations may not be relevant to the central question: am I ready for deception?

6 Jul

How Deception Technology Helps the Modern CISO

READ MORE

What makes deception technology a necessary part of a CISO’s overall security strategy? The simple answer is that it allows a CISO to address key pain points that are causing major operational challenges right now.

23 Jun

From Telemetry to TTPs: a Sample Analysis of a Mining Linux Botnet, Using Cyber Deception

READ MORE

One of the main challenges when investigating an incident is being able to convert all the raw data (typically logs) that you can gather into TTPs (Tools, Techniques and Procedures), or even better, into operational information.

Page 42 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE