Author: Bert Rankin

In 2014, Lastline published a blog titled “Web Security for Advanced Malware and Persistent Threats”. Four years later it remains a very popular post—describing how Lastline compliments Secure Web Gateways (SWGs) to dramatically bolster web security—particularly against Advanced Persistent Threats (APTs). A lot has changed since...

Understanding how malware works, and in particular, the strategies and tactics most often used by malware authors is vitally important for cybersecurity professionals. In other blog posts, Lastline provides a brief history of malware and basic malware types. In this post, we’ll look at some...

Moscone Center bulged with over 42,000 attendees as another exciting RSA conference wrapped up last week in San Francisco. There was more than enough key takeaways from this security conference —  we will only cover a few sessions that sparked our interest. This year’s conference included...

As one might expect, this year’s RSA security conference is buzzing with Internet-of-Things (IoT) security and related presentations, products, and demonstrations. With dozens of vendors and workshops focused on securing and managing unknown devices, IoT security is certainly a hot topic for 2018 and beyond. From...

Machine learning has found application in a breadth of industries, from cancer detection to voice recognition to identity theft prevention. Perhaps unsurprisingly, cybersecurity is another area where machine learning can increase the efficiency and accuracy of operations. This is a topic generating a lot of discussion...

RSAC 2018, one of the largest cybersecurity conference events in the world, is almost here. More than any other, this is the place where leading security companies, researchers, CISOs, and their staffs from across the globe come together to talk, learn, present, and speculate about...

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....