SEARCH
CONTACT US
LASTLINE BLOG
SCHEDULE A DEMO
CONTACT US
SCHEDULE A DEMO
Logo Logo Logo Logo Logo
  • Solutions
    • Lastline Defender
      • Network
      • Email
      • Cloud
      • IoT
    • Lastline Analyst
    • Lastline Detonator
  • Use Cases
    • Security Challenges
      • Secure Public Cloud Workloads
      • Accelerate Threat Response
      • Detect Lateral Movement
      • Prevent Intrusions
      • Block Unauthorized Access
      • Prevent Data Exfiltration
      • Secure Any Email System
    • Industries
      • Financial Services
      • Telecommunications
      • Online Gambling
  • Why Lastline
  • Resources
  • Partnerships
    • Channel Partnerships
    • Technology Alliance Partnerships
    • Strategic Partnerships
    • Partner With Lastline
    • Partner Portal
  • Labs
    • Labs Blog
    • Labs Research Papers
  • Company
    • Threat Intelligence
    • Mission & Principles
    • Management Team
    • Board & Investors
    • News & Events
      • Media Coverage
      • Press Releases
      • Events
    • Lastline Blog
    • Awards
    • Careers
    • Contact
  • Solutions
    • Lastline Defender
      • Network
      • Email
      • Cloud
      • IoT
    • Lastline Analyst
    • Lastline Detonator
  • Use Cases
    • Security Challenges
      • Secure Public Cloud Workloads
      • Accelerate Threat Response
      • Detect Lateral Movement
      • Prevent Intrusions
      • Block Unauthorized Access
      • Prevent Data Exfiltration
      • Secure Any Email System
    • Industries
      • Financial Services
      • Telecommunications
      • Online Gambling
  • Why Lastline
  • Resources
  • Partnerships
    • Channel Partnerships
    • Technology Alliance Partnerships
    • Strategic Partnerships
    • Partner With Lastline
    • Partner Portal
  • Labs
    • Labs Blog
    • Labs Research Papers
  • Company
    • Threat Intelligence
    • Mission & Principles
    • Management Team
    • Board & Investors
    • News & Events
      • Media Coverage
      • Press Releases
      • Events
    • Lastline Blog
    • Awards
    • Careers
    • Contact
cyberwarfare

Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare

Posted by Dr. Bjoern Dennis Prange and Andy Norton ON Apr 30, 2019

By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 3 of a 4-part series on Asynchronous Warfare. In...

Read More
Watering Hole Attacks FI

Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

Posted by Andy Norton ON Apr 25, 2019

Digital criminals use various techniques to breach organizations’ computer systems. One method that continues to be popular among cybercriminals is...

Read More
best hires FI

My Best Hires had 30% of “The Wrong Stuff”

Posted by John DiLullo ON Apr 23, 2019

[NOTE: This post is a derivative of an article by John DiLullo that first appeared in Fast Company.] For companies large...

Read More
IoT security FI

Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

Posted by Andy Norton ON Apr 18, 2019

It's possible: Smart lighting could be the most dangerous element in your company's network. By 2025, there will be 75...

Read More
Asynchronous Warfare Strategy FI

Asynchronous Warfare, Part 2: Strategy and Phases

Posted by Dr. Bjoern Dennis Prange and Andy Norton ON Apr 16, 2019

By Dr. Dennis Prange, edited by Andy Norton NOTE: This is part 2 of a 4-part series on Asynchronous Warfare. Please...

Read More
Security Paranoia FI

Paranoia Reigns Among Security Pros

Posted by John DiLullo ON Apr 11, 2019

Technology, machines, software, UFOs, spontaneous combustion, and crop circles don’t scare me. I’m an engineer, a code writer, a builder,...

Read More
digital security small business owners FI

Think Your Business Is Too Small to Get Hacked? Wake Up!

Posted by Andy Norton ON Apr 9, 2019

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply...

Read More
post-Brexit cybersecurity FI

Post-Brexit Cybersecurity – Implications on Risk and Uncertainty

Posted by Andy Norton ON Apr 2, 2019

Who knows what is going to happen with Brexit, or when the United Kingdom will officially leave the European Union,...

Read More
machine learning for cybersecurity FI

How Machine Learning for Cybersecurity Can Thwart Insider Threats

Posted by Andy Norton ON Mar 27, 2019

While there are innumerable cybersecurity threats, the end goal for many attacks is data exfiltration. Much has been said about...

Read More
secure the cloud FI

How to Secure the Cloud Simply, Effectively, and in Real Time

Posted by Mustafa Rassiwala ON Mar 21, 2019

In my prior blog post on cloud security, I discussed how migrating to the cloud comes with certain security risks...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
LATEST FROM TWITTER
lastlineinc
December 13, 2019

Have you heard? We recently unveiled Lastline Defender 9.0 to enhance public #cloud workload security. Get the scoop from @thecyberwire: http://ow.ly/6BlR50xzDHy

Reply on Twitter 1205623516864897024Retweet on Twitter 1205623516864897024Like on Twitter 12056235168648970241Twitter 1205623516864897024
lastlineinc
December 13, 2019

Looking to learn how to use #MachineLearning to determine which events are anomalies and which are truly malicious? Register for our live demo next week on December 19 to see how we map intrusions and incidents to the MITRE ATT&CK framework: http://ow.ly/B32v50xtugX #ML

Reply on Twitter 1205563477030526976Retweet on Twitter 1205563477030526976Like on Twitter 1205563477030526976Twitter 1205563477030526976
Load More...
Latest Posts
  • December 12, 2019
    Stop Ransomware with Network Detection and Response
  • December 09, 2019
    How to Mitigate Insider Threats on the Network
  • December 03, 2019
    Lastline’s Network Detection and Response Platform Supports Amazon VPC Ingress Routing for Complete Visibility
LATEST PRESS RELEASES
  • December 13, 2019
    Lastline Unveils Defender 9.0 to Enhance Public Cloud Workload Security
MEDIA MENTIONS
  • December 13, 2019
    Containers and Security: Complexity Makes it Easy to Overlook Problems
FROM THE BLOG
  • December 12, 2019
    Stop Ransomware with Network Detection and Response
© 2019 Lastline Inc. All Rights Reserved
Support | Customer Login | Privacy Policy | Policies | 877-671-3239
© 2019 Lastline Inc. All Rights Reserved
Support | Customer Login | Privacy Policy | Policies | 877-671-3239
This website uses cookies for website analytics purposes. For more information on how this website uses cookies, please visit our Privacy Policy. I ACCEPT
Privacy & Cookies Policy

Necessary
Always Enabled

This is an necessary category.

Non Necessary

This is an non-necessary category.

Save & Accept