Live from InfoSecurity Europe 2019: Understanding the Cloud Security Conversation
Lastline is once again participating in Infosecurity Europe in London. And while there are numerous hot topics being discussed, cloud...
Lastline is once again participating in Infosecurity Europe in London. And while there are numerous hot topics being discussed, cloud...
Two years ago, the world was paralyzed for several days, and news announcers introduced a new term to the public...
(Excerpt from an article by John DiLullo published in Dark Reading) Teaching a machine to think like a human is the...
It has been given many names: soft war, non-linear war, unconventional hybrid warfare, cyber cold war, Cold War 2.0, and...
Extended supply chains can represent cybersecurity risks that increase significantly with each and every new supplier. Too often hardware component...
By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 4 of a 4-part series on Asynchronous Warfare....
It won’t come as a surprise when I say that digital security has changed over the past few years. Remember...
Security teams work tirelessly every day to protect us from some very skilled cybercriminals. They face a very accomplished and...
This is not a post about dogs, but about Internet security. For the record, I love dogs. For me, Will...
By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 3 of a 4-part series on Asynchronous Warfare. In...
This is an necessary category.
This is an non-necessary category.