Fortscale Insider Blog

03 Aug What’s Going on at Black Hat? Or Are You Incommunicado?

In Dark Reading, I enjoyed Lysa Myers’ entertaining and useful tips for surviving Black Hat. Next year, I’ll need to be certain to take these tech precautions, in particular she wrote: Update your security Take some time before you leave to beef up your security. Update your software, especially the operating system, browser, and plugins. Block all incoming ports and require outgoing apps...

Read More

02 Aug Learning From the Healthcare Industry

I just read a report that 81% of the hospitals and health care insurance companies in the United States experienced a significant data breach during the last two years. That’s a staggering statistic. For the uninformed, here’s a quick recap. It’s estimated that one in 10 U.S. residents were affected by a recent medical data breach. Here’s a list of just...

Read More

26 Jul Detecting Anomalies in a SMART Way – Part 1

Detecting anomalous user behavior is hard. Really hard. Here at Fortscale we show that with the right tools, it’s doable. Our data science team has developed a set of self tuning machine learning based algorithms that aim at doing exactly that. Although the algorithms may be complicated to comprehend, their basic mechanism is easy to understand. The fortscale product contains many...

Read More

21 Jun 201 Days to Identify Data Breach

New study finds that on average it takes 201 days to detect a data breach and 70 additional days to contain it. But advanced technologies can significantly reduce these times. During recent years, numerous reports have shown that in general, it takes an enterprise a number of months to detect that they’ve had a data breach. That’s if they detect it...

Read More
Top 3 cyber security services that even an ostrich would want

15 Jun Top 3 Considerations for Cyber Security Services

There are many organizations out there that provide onsite cyber security assessments as well as remote penetration testing services. Before you select your future cyber security services provider, here are a few things you may want to consider. Cyber Security Services Provider: Top 3 Considerations #1 – Clearly understand what the you want from the cyber security assessment When an organization solicits input...

Read More
User Behavior Analytics real keys

14 Jun The Real Key To User Behavior Analytics

User Behavior Analytics (UBA) uses and benefits from a number of different technologies. But knowing which technologies and data need to be analyzed for any given situation and context, and applying the correct weight for the many variables is the real key. User Behavior Analytics Of necessity UBA utilizes a large number of highly sophisticated technologies, including managing and interoperating with numerous...

Read More
securing cyberspace on NATO agenda

13 Jun Formal Recognition by NATO In Securing Cyberspace

Securing cyberspace becomes official – and it’s taking place in our own companies and homes. Early this month, Major General Ludwig Leinhos, a former director at NATO Headquarters Consultation, Command and Control Staff, said that cyberspace will likely be officially declared an operational warzone at the upcoming NATO summit in Poland this July. Wow! According to General Leinhos, all 28 NATO member...

Read More
domino effect is comparable to a ransomware attack

10 Jun Another Ransomware Attack, Cheap and Effective

Fleecing hospitals was only the beginning, now cybercriminals are coming for the universities. The University of Calgary is the latest victim of a ransomware attack —netting  nasty miscreants a ransom payout of $20,000. The University of Calgary is a leading research university. It is ranked one of the top 10 research universities in the country—housing 73 Canada Research Chairs, with more than 80 research institutes and...

Read More
Information security goals often do not align with IT executive ideals

08 Jun Reality vs Information Security Goals of IT Execs

I just read a new and interesting report from LTM Research that highlights the big gap between information security goals of IT executives and what is really happening in their organizations. IT executives want to detect serious cyber security incidents within a single day, but data shows traditional security solutions don’t usually detect a breach for months – if at all. The...

Read More
Top 5 things in security to tick off your CEO

07 Jun Top 5 CEO “Tick Offs” In Security

The majority of “Top Lists” in security focus on what the C-Suite does wrong or something along those lines. Today I present to you my Top List of what security people do wrong. Please note this is strictly my opinion based on 16 years’ experience in this field looking at it from the perspective of the U.S. Government, commercial enterprise,...

Read More