SEARCH
CONTACT US
LASTLINE BLOG
SCHEDULE A DEMO
Logo Logo Logo Logo Logo
  • Platform
  • Use Cases
    • Your Industry
      • Financial Services
      • Healthcare
      • Telecomm
      • Online Gambling
    • Your Challenge
      • Use MITRE ATT&CK to Improve Security
      • Protect Public Cloud Workloads
      • Accelerate Threat Response
      • Detect Lateral Movement
      • Prevent Intrusions
      • Block Unauthorized Access
      • Prevent Data Exfiltration
      • Secure Any Email System
      • Protect the Internet of Things
      • Block Account Takeover
      • Detecting Advanced Malware
    • Your Role
      • Threat Detection
      • Threat Hunting
      • Incident Response
  • Why Lastline
  • Resources
  • Partnerships
    • Channel Partnerships
    • Technology Alliance Partnerships
    • Strategic Partnerships
    • Partner Portal
  • Labs
    • Labs Blog
    • Labs Research Papers
  • Company
    • Threat Intelligence
    • Mission & Principles
    • Management Team
    • Board & Investors
    • News & Events
      • Media Coverage
      • Press Releases
      • Events
    • Lastline Blog
    • Awards
    • Careers
    • Contact
  • Platform
  • Use Cases
    • Your Industry
      • Financial Services
      • Healthcare
      • Telecomm
      • Online Gambling
    • Your Challenge
      • Use MITRE ATT&CK to Improve Security
      • Protect Public Cloud Workloads
      • Accelerate Threat Response
      • Detect Lateral Movement
      • Prevent Intrusions
      • Block Unauthorized Access
      • Prevent Data Exfiltration
      • Secure Any Email System
      • Protect the Internet of Things
      • Block Account Takeover
      • Detecting Advanced Malware
    • Your Role
      • Threat Detection
      • Threat Hunting
      • Incident Response
  • Why Lastline
  • Resources
  • Partnerships
    • Channel Partnerships
    • Technology Alliance Partnerships
    • Strategic Partnerships
    • Partner Portal
  • Labs
    • Labs Blog
    • Labs Research Papers
  • Company
    • Threat Intelligence
    • Mission & Principles
    • Management Team
    • Board & Investors
    • News & Events
      • Media Coverage
      • Press Releases
      • Events
    • Lastline Blog
    • Awards
    • Careers
    • Contact

Author: Brian Laing

email threat

Tracking the Evolution of Organizations’ Email Threat Defenses

Posted by Brian Laing ON Sep 4, 2019

In 2017, Lastline identified the top email threats facing organizations. Little has changed since then in terms of the list itself. These threats are still using malicious email attachments, malicious links or enticements to perform malicious actions. More than that, the threat categories themselves have...

Read More
account takeover

How to Take Account Takeover Fraudsters Out to the Curb

Posted by Brian Laing ON Aug 15, 2019

Digital criminals resort to ransomware attacks, malvertising, DNS hijacking, and other techniques to prey upon organizations. These techniques commonly vary in prevalence based upon the economic sector. In a survey conducted by the Aite Group, for instance, 89 percent of executives at financial institutions said...

Read More
Ethical Hacking

Can You Hack My Network? Why Ethical Hacking is Essential for Improving Your Security

Posted by Brian Laing ON Jul 18, 2019

You’ve convinced the necessary parties to invest in improving your information security, examined your options, and selected and deployed a new cybersecurity solution. Even once you’re up and running, however, you might not feel completely secure. Is there anything you missed during deployment, which you...

Read More
Phishing Campaigns FI

Hurricanes, Politics, and Sports: How to Defend Against Juicy, Topical Phishing Campaigns

Posted by Brian Laing ON Jul 16, 2019

Hurricane season 2019 is now upon us. Between now and mid-autumn, there will be storms whose devastation will disrupt people’s lives. Unfortunately, there will also be fraudsters who’ll attempt to capitalize on these disaster victims’ misery. The Cybersecurity and Infrastructure Security Agency (CISA) is well-aware of...

Read More
Federal Agencies’ Security Programs FI

DHS: Three-Quarters of Federal Agencies’ Security Programs are at Risk of Cyberattack

Posted by Brian Laing ON Jun 25, 2019

Digital threats facing federal entities are at an all-time high. This revelation was readily apparent in the findings of SolarWinds’ fifth annual Federal Cybersecurity Survey. Of the 200 IT security professionals in U.S. federal civilian and defense agencies surveyed, more than half (56 percent) of...

Read More
threats target employees FI

Cybersecurity Threats Target Your Employees: What are the Human Costs?

Posted by Brian Laing ON Jun 18, 2019

Much has been said about how employees can often be an organization’s most significant point of vulnerability when it comes to cybersecurity threats. A 2017 study found that 84% of respondents attributed the success of cyberattacks against their company, at least in part, to human...

Read More
Infosecurity Europe 2019 FI

Live from InfoSecurity Europe 2019: Understanding the Cloud Security Conversation

Posted by Brian Laing ON Jun 6, 2019

Lastline is once again participating in Infosecurity Europe in London. And while there are numerous hot topics being discussed, cloud security quickly rose to the top. Migrating to the cloud and the security of those workloads are understandably a concern for many that are undergoing digital...

Read More
WannaCry cyberattack

Two Years Since the WannaCry Cyberattack: What the Industry Has Learned (and What it Hasn’t)

Posted by Brian Laing ON Jun 5, 2019

Two years ago, the world was paralyzed for several days, and news announcers introduced a new term to the public that many had never heard before: ransomware. The WannaCry cyberattack was the first genuinely global mass ransomware attack, and it skyrocketed the idea into the...

Read More
Stop Malware with Tripwire Lastline FI

Security as a Team Sport: Working Together to Stop Malware in Its Tracks

Posted by Brian Laing ON Oct 18, 2018

Digital threats are more numerous today than they were years ago. Illustrating this fact, Kaspersky Lab’s in-lab detection technologies identified 360,000 new threats each day in 2017. That figure is 11.5 percent more than 2016, and it represents the second year in a row where...

Read More
email security

Email Security Solutions Part 2: What Does it Take to Implement Effective Email Threat Visibility?

Posted by Brian Laing ON Jun 21, 2018

In part 2 of this 2-part blog post, we’ll discuss the essential characteristics of technologies that have proven effective for augmenting Secure Email Gateways (SEGs) and stopping email-based malware attacks. Please see part 1, which discusses the challenges of detecting advanced malware attacks using outdated...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
LATEST PRESS RELEASES
  • Lastline Boosts SOC Efficiency by 100%, Effectively Doubling Productivity of SOC Teams
    21 May, 2020
MEDIA MENTIONS
  • Coronavirus-Themed Phishing Fears Largely Overblown, Researchers Say
    20 May, 2020
FROM THE BLOG
  • Lastline to be Acquired by VMware
    04 June, 2020
© 2020 Lastline Inc. All Rights Reserved
Support | Customer Login | Privacy Policy | Your California Privacy | Policies | 877-671-3239
This website uses cookies for website analytics purposes. For more information on how this website uses cookies, please visit our Privacy Policy. I ACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

This is an necessary category.

Non Necessary

This is an non-necessary category.

Save & Accept