Author: Bert Rankin

Understanding how malware works, and in particular, the strategies and tactics most often used by malware authors is vitally important for cybersecurity professionals. In other blog posts, Lastline provides a brief history of malware and basic malware types. In this post, we’ll look at some...

Moscone Center bulged with over 42,000 attendees as another exciting RSA conference wrapped up last week in San Francisco. There was more than enough key takeaways from this security conference —  we will only cover a few sessions that sparked our interest. This year’s conference included...

As one might expect, this year’s RSA security conference is buzzing with Internet-of-Things (IoT) security and related presentations, products, and demonstrations. With dozens of vendors and workshops focused on securing and managing unknown devices, IoT security is certainly a hot topic for 2018 and beyond. From...

Machine learning has found application in a breadth of industries, from cancer detection to voice recognition to identity theft prevention. Perhaps unsurprisingly, cybersecurity is another area where machine learning can increase the efficiency and accuracy of operations. This is a topic generating a lot of discussion...

RSAC 2018, one of the largest cybersecurity conference events in the world, is almost here. More than any other, this is the place where leading security companies, researchers, CISOs, and their staffs from across the globe come together to talk, learn, present, and speculate about...

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....

Identity theft continues to be a challenging and expensive risk for consumers, and malware that’s specifically designed to steal users’ account data and identities are often used to commit the crime. The reason for this persistent threat? Simple, identity theft is a very lucrative business for cybercriminals. The...

With no remedy in sight to the cybersecurity talent shortage, organizations must be creative, determined, and mobilized. Rather than focusing on what the organization doesn't have, cybersecurity professionals must instead get optimal performance from the resources they have ready and available. Through advanced cybersecurity technologies,...