Our blog is a playground with fresh ideas about security and our approach.

11 Oct

CounterCraft at NIAS 2017

Read more

CounterCraft will exhibit at NIAS 2017, NATO’s annual cyber symposium, that will take place from 17 to 19 October in Mons, Belgium. We’ll be at stand B18 to talk about our Deception Platform and how it can help organizations gather high-quality intelligence on attackers while misdirecting them. In addition, we will hold a workshop session under the title of “Active Defence with Attack Trees and Deception” on Tuesday, 17. Visit us at stand B18 and ask for a trial

6 Jul

The next step for CounterCraft

Read more

The evolution of IT security in recent years has generated a wide range of sensations: sometimes we feel like we are tripping over the same stone over and over. Other times, it’s more like a déjà vu. And sometimes it even feels like we’ve reencountered Punxsutawney Phil, the groundhog. For a long time, we’ve invested considerable resources in protecting intelligence and trying to stay one step ahead of cyber threats through information management, while still monitoring the desktop.

28 Jun

Deception technologies for innovative cities: CounterCraft at Innovative City 2017

Read more

Next week we’ll be exhibiting at Innovative City 2017, an event on the future of cities, which will take place in Nice (France). Our stand will be 70d (Pavillon Start Up). This year, Innovative City’s motto is “Where Innovation means New Models for Cities and Citizens”, and some of the conference’s topics will be smart cities, the IoT and Big Data. Deception technology will play a vital role in this scenario, providing a ground-breaking approach against the new types of cyberattacks that will appear.

16 Jun

CounterCraft and the growing trend of deception technologies at Infosecurity Europe 2017

Read more

We are back from Infosecurity Europe, the largest conference on information security in the region. Just like last year —when we participated for the first time as exhibitors— it was a remarkable experience. We noticed an increasing interest among attendees regarding deception technologies. Nowadays, many companies understand that a traditional security approach —such as unsuccessfully trying to keep intruders out of a system— is not enough to make an organization secure.

2 Jun

CounterCraft, in a EU–funded project to fight against the illegitimate uses of virtual currencies

Read more

CounterCraft will be one of the fifteen international partners involved in a project called TITANIUM (Tools for the Investigation of Transactions in Underground Markets), created to stop criminals and attackers from using blockchain technology to hide from the police, while at the same time respecting the privacy and rights of legitimate users. Blockchain technology is a distributed ledger under decentralised control, which allows it to evade traditional investigative techniques. The best-known application of blockchain technology is Bitcoin, a virtual currency which has many legitimate uses but is also employed for criminal purposes in the so-called dark web.

26 May

CounterCraft’s Distributed Deception Platform, at Infosecurity Europe 2017

Read more

This June, we will participate in Infosecurity Europe 2017, the largest information security conference in the region, which will be held at the Olympia, in London (6-8 June). If you are interested in CounterCraft’s Distributed Deception Platform, and want to know how it can help your company detect targeted attacks, Infosecurity Europe will be an excellent opportunity for a meeting. Register for free and visit our stand G123, where our team will offer a demo of CounterCraft’s Distributed Deception Platform.

10 May

CounterCraft in Locard Cyber Security Summit 2017

Read more

This week, David Barroso, CEO and Founder of CounterCraft, will be keynoting Locard Cyber Security Summit 2017, (Bilgi Teknolojileri ve İletişim Kurumu, Ankara, Turkey) on May 11th, titled “Generating and leveraging 1st party threat intelligence using deception techniques”. Besides, CounterCraft will participate in the workshop “Incident Cyber Response Team”, alongside Enigmasec and Austability. If you are going to be in Ankara the 11th May, and you are interested in our talk and workshop, get your ticket here.

31 Mar

CounterCraft graduates from GCHQ Cyber Accelerator

Read more

After three intense months, the first GCHQ Cyber Accelerator programme, powered by Wayra UK part of Telefónica Open Future_ - is over. It seems like yesterday when CounterCraft was selected to join it, and yet on Thursday we had to bid farewell to the funky accelerator office space that had become a second home for us. “The best thing about the experience has been the people, both from the organisers GCHQ and Wayra and from the other companies on the accelerator”, said Dan Brett, CSO.

21 Mar

CounterCraft contributing to the UK’s cybersecurity at CyberUK and GCHQ

Read more

In response to the growing concern regarding cyberattacks against UK organizations, events such as CyberUK serve as a platform for cybersecurity experts and vendors with the aim of making the UK the safest place to do business online. CounterCraft was honoured to be part of this event, which took place in Liverpool on 14-16 March. One of the objectives of CyberUK 2017 was encouraging pro-active defence, something that relates to CounterCraft’s approach to cybersecurity through counterintelligence, which turns a passive IT security stance into an active defence, thus empowering businesses.

13 Mar

H2020 SME Instrument grants €1.1M to CounterCraft’s project, “Intelligence campaigns in the digital realms”

Read more

CounterCraft has been selected for phase 2 funding by the Horizon 2020 SME Instrument. CounterCraft will receive €1.1M funding for its project, “Intelligence campaigns in the digital realms”, through the EU’s research and innovation programme, Horizon 2020 SME Instrument. The grant will be held to accelerate the development of new features and growth of the pioneering cybersecurity deception platform, capable of detecting advanced targeted cyberattacks, obstructing the actions of attackers, and obtaining the maximum amount of information from them by successfully designing, deploying, monitoring and managing automated counterintelligence campaigns.

Page 1 of 2