Fortscale Insider Blog

fbi-ransomware-prevention-and-response-for-cisos

30 Nov FBI Tips to Guard Against Ransomware

It’s interesting to read how many businesses are getting infected with ransomware. It’s also interesting so see that a lot of them are quick to transfer bitcoins to recover their encrypted files. I suppose most of us have mused about how we would respond if we were bitten by ransomware.  Would you pay? The FBI published a “Public Service Announcement” regarding ransomware. The...

Read More
fortscale_user_profile

02 Nov User Experience Design – The User’s Perspective

"Design is a funny word. Some people think design means how it looks. But of course, if you dig deeper, it's really how it works."   Steve Jobs When I started practicing, UX designers frequently had to explain what it is they actually do. The common understanding was that engineers wrote the code, and then we, as designers, had to "prettify" their...

Read More
Probability 4

11 Oct Detecting Anomalies in a SMART Way – Part 3

In the first post of this series I described how we at Fortscale use a personalized adaptive threshold for triggering alerts. Each user’s activity is assigned a risk score (known as the SMART value) that triggers a SMART alert when it crosses the user’s threshold. We explained how the more anomalous activities a user performs through time, the higher his...

Read More
Probability 4

20 Sep Detecting Anomalies in a SMART Way – Part 2

In the previous post of this series I described how we at Fortscale use a personalized adaptive threshold for triggering alerts. Each user’s activity is assigned a risk score (known as the SMART value) that triggers a SMART Alert when crosses the user’s threshold. We explained how  the more anomalous activities a user performs through time, the higher his threshold...

Read More
Conclusion

06 Sep UEBA Should Provide Conclusions, Not Just Anomalies

As with all technologies, UEBA has evolved over time. We at Fortscale take a great deal of pride in working closely with both our large and small customers to understand their specific needs and to respond to those needs. Although UEBA has always provided more information and context then just SIEM or event logs, after listening carefully to our customers, we...

Read More
No Rules

29 Aug No Rules!  UEBA as it Should be

When significant new technology appears in the marketplace, it’s always interesting to see how many vendors and products quickly jump on the band wagon to embrace it. The trouble is that with many of the vendors there is no real substance to their claims regarding the new technology. It’s often just talk; smoke and mirrors; and clever use of marketing...

Read More
LeakedCredentials

15 Aug Detecting Insider Credentials Compromised on the Dark Web

For years, I've been fascinated with the Dark Web. In particular, the people who buy and sell information there, how they steal and hide information, and their motivations for their actions. Over the years, I've learned about the fraudsters' hierarchy. Talk about a crime ring! Fresh credit card details are sold based on a fraudster's rank within the organization - with...

Read More
Lateral Movement

15 Aug Detecting Remote Lateral Movement

Malicious Users Will Move Laterally to Abuse Internal Resources Leveraging legitimate employees’ credentials is known to be one of the main tools used by attackers that would like to infiltrate the enterprise. Apart from getting inside, it is also a common practice as part of the attacker lateral movement towards achieving its malicious intentions. The term ‘Lateral Movement’ refers to the attack...

Read More
sources

15 Aug Fortscale for DLP

What is DLP? Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is used to describe software products that help a network administrator control what data end users can transfer.[1] We are proud to announce the addition of DLP to the wide range of...

Read More