Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

What We're Reading

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

22 May

Key benefits of using deception for threat hunting plus use cases

READ MORE

Many organizations are enthusiastic to adopt threat hunting as part of their cybersecurity arsenal, but in our experience, the key to success is to develop a thorough understanding of the benefits and less-obvious limitations before embarking on any enterprise level threat hunting program.

29 Apr

Practical application of MITRE ATT&CK™ in threat hunting

READ MORE

The MITRE ATT&CK™ knowledge base framework is not only an excellent resource, it also provides the global cybersecurity community with a common language for explaining incidents and understanding how attackers operate.

15 Apr

Nine dates for your cyber security diary

READ MORE

The global events calendar for the cyber security industry never fails to provide us with plenty of opportunities to connect, collaborate and catch up with friends old and new.

29 Mar

Tool Up Your Threat Hunting Team with Deception Technology

READ MORE

Deception is a natural fit with threat hunting and threat intelligence gathering: it allows teams to engage with adversaries earlier in the attack sequence that has been defined by the MITRE ATT&CK framework.

6 Mar

CounterCraft presents fully MITRE integrated platform that tools up threat hunting teams at RSA Conference SF

READ MORE

It’s the third year running at USA RSA Conference for CounterCraft, and this year we’re proud to be representing the UK Government’s Department of International Trade as GCHQ alumni, as the business continues to expand its presence in the UK and global market.

Page 47 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE