Fortscale Insider Blog

26 Jul Detecting Anomalies in a SMART Way – Part 1

Detecting anomalous user behavior is hard. Really hard. Here at Fortscale we show that with the right tools, it’s doable. Our data science team has developed a set of self tuning machine learning based algorithms that aim at doing exactly that. Although the algorithms may be complicated to comprehend, their basic mechanism is easy to understand. The fortscale product contains many...

Read More

21 Jun 201 Days to Identify Data Breach

New study finds that on average it takes 201 days to detect a data breach and 70 additional days to contain it. But advanced technologies can significantly reduce these times. During recent years, numerous reports have shown that in general, it takes an enterprise a number of months to detect that they’ve had a data breach. That’s if they detect it...

Read More
Top 3 cyber security services that even an ostrich would want

15 Jun Top 3 Considerations for Cyber Security Services

There are many organizations out there that provide onsite cyber security assessments as well as remote penetration testing services. Before you select your future cyber security services provider, here are a few things you may want to consider. Cyber Security Services Provider: Top 3 Considerations #1 – Clearly understand what the you want from the cyber security assessment When an organization solicits input...

Read More
User Behavior Analytics real keys

14 Jun The Real Key To User Behavior Analytics

User Behavior Analytics (UBA) uses and benefits from a number of different technologies. But knowing which technologies and data need to be analyzed for any given situation and context, and applying the correct weight for the many variables is the real key. User Behavior Analytics Of necessity UBA utilizes a large number of highly sophisticated technologies, including managing and interoperating with numerous...

Read More
securing cyberspace on NATO agenda

13 Jun Formal Recognition by NATO In Securing Cyberspace

Securing cyberspace becomes official – and it’s taking place in our own companies and homes. Early this month, Major General Ludwig Leinhos, a former director at NATO Headquarters Consultation, Command and Control Staff, said that cyberspace will likely be officially declared an operational warzone at the upcoming NATO summit in Poland this July. Wow! According to General Leinhos, all 28 NATO member...

Read More
domino effect is comparable to a ransomware attack

10 Jun Another Ransomware Attack, Cheap and Effective

Fleecing hospitals was only the beginning, now cybercriminals are coming for the universities. The University of Calgary is the latest victim of a ransomware attack —netting  nasty miscreants a ransom payout of $20,000. The University of Calgary is a leading research university. It is ranked one of the top 10 research universities in the country—housing 73 Canada Research Chairs, with more than 80 research institutes and...

Read More
Information security goals often do not align with IT executive ideals

08 Jun Reality vs Information Security Goals of IT Execs

I just read a new and interesting report from LTM Research that highlights the big gap between information security goals of IT executives and what is really happening in their organizations. IT executives want to detect serious cyber security incidents within a single day, but data shows traditional security solutions don’t usually detect a breach for months – if at all. The...

Read More
Top 5 things in security to tick off your CEO

07 Jun Top 5 CEO “Tick Offs” In Security

The majority of “Top Lists” in security focus on what the C-Suite does wrong or something along those lines. Today I present to you my Top List of what security people do wrong. Please note this is strictly my opinion based on 16 years’ experience in this field looking at it from the perspective of the U.S. Government, commercial enterprise,...

Read More
login credentials were easy for this celebrity hacker

07 Jun Celebrity Hacker Proves It’s Easy to Get Login Credentials

The Romanian cyber criminal known as the “Celebrity Hacker” revealed how easy it is to obtain login credentials –and his long list of successful hacks proves that his simple methods work. Login Credentials are Easy Guesses Marcel Lehel Lazar, who broke into the accounts of numerous celebrities, politicians, and government officials recently plead guilty in a U.S. District Court to charges of...

Read More
insider spy

06 Jun How to detect an Insider Spy

An insider spy is perhaps the most significant threat to enterprise security. Monitoring their behavior is a critical component in detecting and deterring their activities. Some years ago the Chinese government sent Chi Mak to the United States to obtain employment in the defense industry with the goal of stealing US defense secrets, which he did for over 20 years. Among...

Read More