Fortscale Insider Blog

LeakedCredentials

15 Aug Detecting Insider Credentials Compromised on the Dark Web

For years, I've been fascinated with the Dark Web. In particular, the people who buy and sell information there, how they steal and hide information, and their motivations for their actions. Over the years, I've learned about the fraudsters' hierarchy. Talk about a crime ring! Fresh credit card details are sold based on a fraudster's rank within the organization - with...

Read More
Lateral Movement

15 Aug Detecting Remote Lateral Movement

Malicious Users Will Move Laterally to Abuse Internal Resources Leveraging legitimate employees’ credentials is known to be one of the main tools used by attackers that would like to infiltrate the enterprise. Apart from getting inside, it is also a common practice as part of the attacker lateral movement towards achieving its malicious intentions. The term ‘Lateral Movement’ refers to the attack...

Read More
sources

15 Aug Fortscale for DLP

What is DLP? Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is used to describe software products that help a network administrator control what data end users can transfer.[1] We are proud to announce the addition of DLP to the wide range of...

Read More
sources

15 Aug Fortscale for Secure Web Gateways

What is a Secure Web Gateway? A secure Web gateway is a type of security solution that prevents unsecured traffic from entering an internal network of an organization. It is used by enterprises to protect their employees/users from accessing and being infected by malicious Web traffic, websites and virus/malware.[1] We are proud to announce the addition of Secure Web Gateways to the...

Read More
sources

15 Aug Fortscale for TACACS & RADIUS

What is TACACS? TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.[1] What is Radius? Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables...

Read More
jobs-BG-1-1024x529

15 Aug Fortscale 2.7 Released!

With so much happening at Fortscale, it seems like every single day marks some special event. But today, with the release of Fortscale 2.7, we are celebrating a particularly momentous day. As I reflect on the last few years and how we got to this point with the product, I find the evolution that’s taken place in the security analytics space...

Read More
SWIFT bank heist money

10 Aug Cost of a Data Breach Hits $4 Million Dollars

New study shows the cost of a data breach to be $4 million dollars on average, increasing 29 percent during the last 2 years. IBM Security’s recent report on the cost of a data breach shows that costs continue to rise. Getting hacked has always been expensive, but this report shows the average price is now around $4 million dollars for...

Read More
IMG_3691

03 Aug What’s Going on at Black Hat? Or Are You Incommunicado?

In Dark Reading, I enjoyed Lysa Myers’ entertaining and useful tips for surviving Black Hat. Next year, I’ll need to be certain to take these tech precautions, in particular she wrote: Update your security Take some time before you leave to beef up your security. Update your software, especially the operating system, browser, and plugins. Block all incoming ports and require outgoing apps...

Read More
stethoscope on laptop keyboard

02 Aug Learning From the Healthcare Industry

I just read a report that 81% of the hospitals and health care insurance companies in the United States experienced a significant data breach during the last two years. That’s a staggering statistic. For the uninformed, here’s a quick recap. It’s estimated that one in 10 U.S. residents were affected by a recent medical data breach. Here’s a list of just...

Read More
JoeSunday

26 Jul Detecting Anomalies in a SMART Way

Detecting anomalous user behavior is hard. Really hard. Here at Fortscale we show that with the right tools, it’s doable. Our data science team has developed a set of self tuning machine learning based algorithms that aim at doing exactly that. Although the algorithms may be complicated to comprehend, their basic mechanism is easy to understand. The fortscale product contains many...

Read More