Fortscale Insider Blog

20 Sep Detecting Anomalies in a SMART Way – Part 2

In the previous post of this series I described how we at Fortscale use a personalized adaptive threshold for triggering alerts. Each user’s activity is assigned a risk score (known as the SMART value) that triggers a SMART Alert when crosses the user’s threshold. We explained how  the more anomalous activities a user performs through time, the higher his threshold...

Read More

06 Sep UEBA Should Provide Conclusions, Not Just Anomalies

As with all technologies, UEBA has evolved over time. We at Fortscale take a great deal of pride in working closely with both our large and small customers to understand their specific needs and to respond to those needs. Although UEBA has always provided more information and context then just SIEM or event logs, after listening carefully to our customers, we...

Read More

29 Aug No Rules!  UEBA as it Should be

When significant new technology appears in the marketplace, it’s always interesting to see how many vendors and products quickly jump on the band wagon to embrace it. The trouble is that with many of the vendors there is no real substance to their claims regarding the new technology. It’s often just talk; smoke and mirrors; and clever use of marketing...

Read More

15 Aug Detecting Insider Credentials Compromised on the Dark Web

For years, I've been fascinated with the Dark Web. In particular, the people who buy and sell information there, how they steal and hide information, and their motivations for their actions. Over the years, I've learned about the fraudsters' hierarchy. Talk about a crime ring! Fresh credit card details are sold based on a fraudster's rank within the organization - with...

Read More

15 Aug Detecting Remote Lateral Movement

Malicious Users Will Move Laterally to Abuse Internal Resources Leveraging legitimate employees’ credentials is known to be one of the main tools used by attackers that would like to infiltrate the enterprise. Apart from getting inside, it is also a common practice as part of the attacker lateral movement towards achieving its malicious intentions. The term ‘Lateral Movement’ refers to the attack...

Read More

15 Aug Fortscale for DLP

What is DLP? Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is used to describe software products that help a network administrator control what data end users can transfer.[1] We are proud to announce the addition of DLP to the wide range of...

Read More

15 Aug Fortscale for Secure Web Gateways

What is a Secure Web Gateway? A secure Web gateway is a type of security solution that prevents unsecured traffic from entering an internal network of an organization. It is used by enterprises to protect their employees/users from accessing and being infected by malicious Web traffic, websites and virus/malware.[1] We are proud to announce the addition of Secure Web Gateways to the...

Read More

15 Aug Fortscale for TACACS & RADIUS

What is TACACS? TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.[1] What is Radius? Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables...

Read More

15 Aug Fortscale 2.7 Released!

With so much happening at Fortscale, it seems like every single day marks some special event. But today, with the release of Fortscale 2.7, we are celebrating a particularly momentous day. As I reflect on the last few years and how we got to this point with the product, I find the evolution that’s taken place in the security analytics space...

Read More
SWIFT bank heist money

10 Aug Cost of a Data Breach Hits $4 Million Dollars

New study shows the cost of a data breach to be $4 million dollars on average, increasing 29 percent during the last 2 years. IBM Security’s recent report on the cost of a data breach shows that costs continue to rise. Getting hacked has always been expensive, but this report shows the average price is now around $4 million dollars for...

Read More