Fortscale Security Blog

Fortscale Insider blog to make you Smarter and Safer.

Fortscale and RSA Are Joining Forces – Acquisition Announcement

IoT Security? Few Organizations Even Know How Many Devices They Have

Cybersecurity Skills Shortage Worsens

Fifty Percent of Data Breaches Discovered by Someone Other than the Victim

CEO Can No Longer Pass the Buck for Cybersecurity Incidents

Presidio as a Service

Misconfigured Cloud Services a Big Cause of Data Breaches

Former Employees Are a Big Cybersecurity Risk

Cryptocurrency’s Impact on Cybercrime

Inexpensive but Effective Cybersecurity Tips for 2018

2017 – Cybersecurity in Review

Would UEBA Have Prevented the Massive Uber Data Breach?

The big Elephant in the room – the lack of security analytics in security products

Solving the Shortage of Security Professionals

Meeting the Ongoing Security Operations Challenge

Many Factors Increasing Security Analyst Workload

Off-the-Shelf Analytics for Every Component of the Security Infrastructure

Research Confirms Fortscale Approach to Make Security Operations More Efficient

Ingest and Normalizes Data from Any Source

Rules-Based Approach to Behavioral Analytics Doesn’t Work

Removing the Complexities from UEBA

UEBA Could Have Stopped The Deloitte Data Breach

Fortscale Announces Quest Software Partnership

Fortscale and LogPoint Join Forces

User Behavior Analytics and Why It Matters

Volumes of Isolated Data Hide Hackers

Enterprise Data Breaches are at All Time Highs – Again!

Manufacturing Companies Now Being Targeted by Ransomware

Medical Devices a Cybersecurity Nightmare

Behavioral Analytics Can Benefit Anyone – It’s Time it Was Available to Everyone

Fortscale Named an Emerging Vendor by CRN

Millions of Verizon Customer Records Exposed in Security Lapse

Weak Passwords – Risks Continue

Password-Stealing Malware Has Huge Impact

AI – The Next Frontier of Cybersecurity

Active Response Against Cybercrime – Is It Time?

Verizon Data Breach Report Confirms No one is Immune from Cybercrime

Why IoT Security Matters

Fortscale Expanding Solution Partner Network

Employees Falling for New Microsoft Word Malware

Fortscale Enhances DLP Deployment – Helps Prevent Malicious Data Extrusion

Cyber Criminals Successfully Stealing Our Tax Refunds – Again!

Fortscale 3.0 Design Matters

Insiders Allegedly Steal Self Driving Car Technology

AI Powered UEBA Threat Hunting

Rediscovering DLP

Fortscale Releases Version 3.0 Bringing Proactive Threat Hunting and Data Loss Protection Support to UEBA

New Patent Sheds Light on Some of the Advancements Fortscale has Made in the UEBA Industry

Improved Cybersecurity through Collaboration

Welcome Evolution Equity and Valor Capital to Fortscale

Presidio™ – The Industry’s First Embedded UEBA Engine

Machines Gives Cybersecurity a Big Boost

Cyber Security in 2017 – Predicting What Will Not Happen

Fortscale 2016 Achievements

FBI Tips to Guard Against Ransomware

Ransomware Evolution is Remarkable and Creepy

User Experience Design – The User’s Perspective

Detecting Anomalies in a SMART Way - Part 3

Detecting Anomalies in a SMART Way - Part 2

UEBA Should Provide Conclusions, Not Just Anomalies

No Rules! UEBA as it Should be

Fortscale for TACACS & RADIUS

Fortscale for Secure Web Gateways

Fortscale for DLP

Detecting Remote Lateral Movement

Detecting Insider Credentials Compromised on the Dark Web

Detecting Insider Credentials Compromised on the Dark Web

Detecting Remote Lateral Movement

Fortscale for DLP

Fortscale for Secure Web Gateways

Fortscale for TACACS & RADIUS

Fortscale 2.7 Released!

Cost of a Data Breach Hits $4 Million Dollars

What’s Going on at Black Hat? Or Are You Incommunicado?

Learning From the Healthcare Industry

Detecting Anomalies in a SMART Way - Part 1

201 Days to Identify Data Breach

Top 3 Considerations for Cyber Security Services

The Real Key To User Behavior Analytics

Formal Recognition by NATO In Securing Cyberspace

Another Ransomware Attack, Cheap and Effective

Reality vs Information Security Goals of IT Execs

Top 5 CEO "Tick Offs" In Security

Celebrity Hacker Proves It’s Easy to Get Login Credentials

How to detect an Insider Spy

Security Training Helps, But it’s Not Enough

LinkedIn Breach Surges by 110 Million Records

How IT Staff Can Make a Professional Internal Penetration Test —Part 2

Fort Friday Security Clips— Reddit, Myspace Compromised Accounts Rising

OpIcarus — Hactivists Strike Global Banks — And Us

Dark Web — Tor Use is 50% Criminal Activity — How to Detect It

How IT Staff Can Make a Professional Internal Penetration Test —Part 1

Stolen Credentials — Millions of User Passwords for Sale on Black Market

Fort Friday Security Clips— Flight 804, TeslaCrypt, Cyber-espionage Malware Discovered

Compromised Passwords in 6 of Top 10 Vulnerabilities

Data Theft —Top 5—Who’s Stealing Your Data?

Compromised Credentials Spin Wendy’s Data Breach, It's Ground Hog Day Again

Fortscale Update: Sitewide Upgrades

Cybersecurity Apathy – A misunderstood or bound for failure endeavor

When Someone Else Gets Hacked – Watch Out!

Fortscale Leadership Momentum Continues

Fort Friday Security Clips— Fortscale, Locky & DDoS

Gambling with Sloppy Security Practices

Top 10 Ways to Spot a Phishing Expedition

RANSOMWARE —It’s like VISA—It’s everywhere you want to be

2016—The Year of Ransomware

Fort Friday Security Clips— Hackers Paradise & Rule 41

U.S. Government Now Engages with New Security Vendors in Days, not Years

Insider Threats versus Insider Threat Intelligence

Insider Threat Security Gates—Wide Open

Short-end security - How Hacking Team got Hacked

The Honest Truth to Insider Threat Security

Fort Friday Security Clips—Cheap switches & C-suite Whaling

Cybercrime Groups More Damaging than Hackers

Insider Threats – Is it really as intentional as we think?

Data Breaches Worse than Thought–Many Firms Not Reporting

Security Questions Not Hard For Hackers

Fort Friday Security Clips—Gov has lowest score for cybersecurity, ISACA LA

The Naughty List Is New Again

Law Firms – Next Wave of Cyber Attacks?

Scammed by a fake data breach

Your Computer Mouse Can Betray You

Fort Friday Security Clips—the Panama Papers, ransomware with a twist

Hacked corporate email accounts dirt cheap in the underground

Fear The Walking Dead: Reanimated Ex-Employee Credentials

Costs of a Data Breach Continue to Increase

Are Cyber Crooks Collecting Your Tax Return?

Fort Friday Security Clips—MongoDB, Crypto-ransomware & R0b1N H00d foolery

Fortscale’s Latest Discovery “R0b1N H00d” Malware Does Pretty Much Exactly What You’d Think

Prior to the data breach . . . insider threats for TCC?

Good Tools Help Shortage of Cybersecurity Professionals

Home Depot to Pay at Least $19.5 Million to Consumers

Verizon Breach, It Can Happen To Anyone

Fort Friday Security Clips—Verizon hacked, OS X zero-day

Insider threats — Trend Du Jour

Need for Cybersecurity Accelerates

Data Manipulation – Worse Than Theft

Security Breaches Often Underestimated

Fort Friday Security Clips—FBI to Apple: Let me in, Ransomware: 216 Degrees Fahrenheit

AceDeceiver, iOS Malware

Security Myths about Your Employees

SWIFT Credentials Bank Heist

When a Computer Security Firm Gets Hacked

Major Data Breach at Ofcom by Ex-employee

In-flight Wi-Fi, Careful You might get hacked!

Fortscale 2.5 – Cisco Platform Exchange Grid (pxGrid)

Fortscale 2.5 – Generic Data Source Framework

Fortscale 2.5 – Streamlined Investigation, Email Subscriptions, & Reports

Fortscale 2.5 – Generic Data Source Framework

Email Alert Subscriptions – New Fortscale 2.5 Feature

Out-of-the-Box UEBA for Protection of Additional Systems

RSA Conference: 25 Years On.

Good UEBA Investigation Tools Make Analyst’s Life Easier

Fortscale at RSA: From Innovation Sandbox to UBA Market Leaders

Get Stylin’ at RSA with Fortscale!

It's time to kill the password

Fortscale joins the FireEye Fuel Cyber Security Coalition (CSC)

Data Breach? Not IF, but When

Linux Mint ISO and forum database hacked

Victim is Last to Know of Data Breach

Monitoring the Company’s Crown Jewels

Compromised by Visits to Shady Network Neighborhoods

60,000 Security Alarms and Not Detected!

UEBA Detects Criminals Covering Their Tracks

UEBA Detects Data Theft and Other Ongoing Attacks

UEBA Detects Attackers Establishing Persistence

Early Attack Phases and UEBA – Getting Administrator Privileges

UEBA Detects Attacks at Initial Reconnaissance & Scanning

Top 10 Security Administration Blunders

Top 10 Security Blunders by Employees

Why SIEM is Not Enough for User Behavior Analytics

Data Breaches May Expose Family and Friends of Victim Too

Misconfigured Database Compromises Voter Data

Multipronged Attack – Coming From Every Direction

Insider Threats – It’s Not Just Your Employees & Partners

IoT Security Raises the Stakes

Target Breach Damages Still Climbing After 2 Years

Trump Hotel – A Year Long Data Breach  

Hackers Undetected for 7 Weeks Inside JPMorgan Networks

VTech Breach – 5 Million Records Stolen Including Photos of Kids

Fortscale 2.0 Features: Responsive Analyst Alert Feedback

Fortscale 2.0 Features: Anomaly Detection Framework

Fortscale 2.0 Features: Single-Screen Investigation

Fortscale 2.0 Features: Improved Analytics Algorithms

Fortscale 2.0 Features: Multi-factor User Analysis

Fortscale 2.0 Features: Dynamic User Thresholds

Fortscale 2.0 Features: Alert-Based Dashboard

Fortscale 2.0 Features: Fortscale™ SMART Alerts

Fortscale Podcast Series Episode 3: Building the Next Generation of Cyber Professionals

Fortscale Podcast Series Episode 2: Your Evolving Digital Life

Ouch – One Fourth of Employees!

Fortscale's SoundCloud Channel is now On The Air!

CN Insider Behaves Badly – To the Tune of $2 Million in Damages

Excellus Latest Healthcare Provider to Sustain a Mass Data Breach

Back When We Started Auditing Our Refrigerator Logs…

Why IT Department Leaks Could be the Worst Impact of a Data Breach

Can Behavior Analytics Prevent Hack & Fraud Schemes?

Fortscale's Vision

Do Yourself a Service - Resolving anomalous Service Account behavior with Fortscale UBA V1.4

Windows 10 and its Surprising User-Centric Upgrades

China: Spying the Friendly Skies?

Insurance Industry Outlines Cyber Security Guidelines

Life Could Indeed Be Short for Ashley Madison

Who’ll defend the Army National Guard from a Sloppy User?

Resolving Anomalous Admin Behaviors With Fortscale User Behavior Analytics v1.4

Are Healthcare Data Breaches a National Epidemic?

LEVERAGING HADOOP FOR RAPID DETECTION AND RESPONSE

HARVARD SEEING CRIMSON IN CHAIN OF SCHOOL HACKS

Behind the Scenes of Fortscale’s 1H Growth

Preventing Insider Threats: When More Context Provides Better Enterprise Security

When “Moneyball” met “CSI:Cyber”

Insider Threats: The Statistics Don’t Lie

Is your PII safe (Government Edition)?

White Water Rafting With the (Cyber Security) Pros

Rombertik Malware – A Form of Cyber Insurance

Limiting the Damage of an Insider Threat

Fortscale Shines Bright at RSA 2015

AT&T: Breach Out and Touch Someone

AT&T: Breach Out and Touch Someone

Come See Fortscale Compete in the Innovation Sandbox Contest at RSA

Slack Hack Cause & Effect

Slack Hack Cause & Effect

Introduction to "Fortscale Labs": Harnessing Science for Implementing a User-Centric Approach in Cybersecurity

Introduction to "Fortscale Labs": Harnessing Science for Implementing a User-Centric Approach in Cybersecurity

PoS Vulnerability is a Symptom, but What is the Disease?

Fortscale to Lead Security Discussion at Cybertech 2015

Attackers Want a Piece of Your PII

The “Carbanak” Campaign – Challenging Behavior Analytics

Anthem Breach Proves Sensitive Assets Are In The Cross Hairs

The Burning Questions - Are You Exposed to the Insider Threat?

The Israel-Silicon Valley Startup Experience

Morgan Stanley: Return of the Rogue User

Is the Sony Hack really a defining moment in Cyber History?

Fortscale Insider - December 2014

Fortscale 2014 Annual Cyber Security Review

Fortscale Insider - November 2014

McAfee

Splunk

Cloudera

ECI

Fortscale Focus 14 Roundup

WHAT WE LEARNED AT SPLUNK CONF. 2014

HOW TO AVOID BEING THE NEXT DATA BREACH VICTIM

Is your sector at risk? Inter-industry projection is the latest buzz

Fortscale is one of Network World’s 10 Security Startups to Watch

Our Forensic Approach To The Risk Of Intellectual Theft

Enterprises Are Shifting Towards A New Approach In Understanding And Analyzing Insider Threats

Who's on First?

Who's on First?

Playing Your Hand - User Intelligence

It's not done in anyway but with love (and a little bit of anger)

It's not done in anyway but with love (and a little bit of anger)

BEWARE OF THE WILD GEESE

So - What is Machine Learning? #1

INTEGRATION WITH BIG DATA REPOSITORIES

HADOOP BASED MACHINE LEARNING ENRICHMENT LAYER

FINDING NEEDLES IN YOUR BIG DATA HAYSTACK

SECURITY ANALYST PLATFORM

Welcome to Fortscale!

ADVANCED ADVERSARIES AND MALICIOUS INSIDERS INTRODUCE NEW CHALLENGES TO THE ENTERPRISE

IT'S NOT A CYBER ATTACK, IT'S A CYBER CAMPAIGN.

IT'S NOT A CYBER ATTACK, IT'S A CYBER CAMPAIGN.

UNDER THE RADAR ATTACK OR MALICIOUS INSIDER MEANS CONTINUOUS THREAT

LEGITIMATE USERS ARE THE MOST COMMON VEHICLE FOR CYBER ATTACK

CONTINUOUS USER INTELLIGENCE IS NEEDED FOR PROACTIVE ENTERPRISE SECURITY

AN EFFECTIVE AND RICH TOOL BOX FOR THE SECURITY ANALYST

ADVANCED ANALYTICS TO AUTOMATICALLY PINPOINT MALICIOUS USER BEHAVIOR

PROACTIVE, INTELLIGENT SECURITY APPROACH

RISK MITIGATION

FAST RESULTS

RISK EVALUATION

IMPROVED ROI

POWERFUL BIG DATA MACHINE LEARNING ALGORITHMS

ANALYST-FRIENDLY TOOL BOX INTERFACE

DYNAMIC ANALYTICS ​ENVIRONMENT

ADVANCED VISUALIZATION TOOLS

MULTI-PLATFORM

COMMUNITY SHARING

PROACTIVE, INTELLIGENT SECURITY APPROACH