Lastline Resources

Get the Latest Information on Defeating Advance Threats and Lastline Products.
  • All
  • Analyst
    Reports
  • Case
    Studies
  • Data
    Sheets
  • Solutions
    Guides
  • Podcasts
    & Videos
  • On-demand
    Webinars
  • White
    Papers
This white paper discusses the advantages as well as the challenges of security products that monitor network traffic, and outlines how Lastline addresses these challenges.
WHITE PAPER
Read how these capabilities can enhance visibility across legacy and cloud domains, analyze network traffic to detect threat tactics and abuses of security policies, improve reposes with automation, clarify remediation requirements, and more. 
ANALYST REPORT
SANS Instructors Mathias Fuchs and Joshua Lemon provide actionable advice to assist organizations as they grow their threat hunting programs and improve their abilities, whether they are new to threat hunting or are simply honing their processes.
On-Demand Webinar
Organizations just starting their threat hunting journey have different needs than those who are honing their skills and programs. This report looks at those differences and how they impact the priorities set by both types of organizations.
ANALYST REPORT
IDC analyst Chris Rodriguez and Lastine head of threat Intel, Richard Henderson, discuss the how IDPS technology has failed to keep up with today’s cybersecurity challenges, and alternatives that filling the gaps. 
On-Demand Webinar
SOC teams are forced into a “do what you can” strategy due to increase volume of alerts, most of which are false positives. Lastline’s head of Threat Intel shares strategies for breaking this cycle. 
On-Demand Webinar
Gartner recommends adding Network Detection and Response (NDR) to your SIEM and EDR to improve threat detection. Learn how this SOC Visibility Triad can deliver high-fidelity alerts with relevant context to make your SOC analyst more productive.
Solution Guides
IDPS software deployed several years ago have not evolved beyond signatures and low-level network protocol analysis, leaving them ill-equipped to detect evasive threats. This paper explores the five most common complaints we hear when our customers describe their IDPS.
WHITE PAPER
In a video interview at 2019 InfoSecurity Europe, Lastline co-founder and CTO, Dr. Giovanni Vigna, discusses how gamification can play an important role in attracting and retaining cybersecurity talent, a "positive pyramid scheme" to build talent, and finding expert talent in other fields.
Podcasts & Videos
Lastline CEO, John DiLullo, will use 5 notorious cyberattacks to illustrate how AI — including expert systems, deep learning, and supervised and unsupervised machine learning — is essential for detecting sophisticated threats.
On-Demand Webinar
Public cloud workloads are at risk as bad actors target unsecured servers and vulnerable data in the public cloud. They take advantage of limited security controls as organizations migrate workloads to the cloud, leaving applications and data exposed. Lastline Defender now protects public cloud workloads against advanced threats attempting to enter or move laterally in your AWS environment. Watch our introductory webinar.
On-Demand Webinar
Lastline's John DiLullo on Tracking Adversaries' Network Movements. It's not enough to detect an attack. To be truly effective, defenders need to capture digital fingerprints and movement through the network. John DiLullo of Lastline discusses this level of defense.
Podcasts & Videos
Learn how our innovative Network Detection and Response platform uses AI to defeat advanced threats, minimize false positives, and streamline remediation efforts.
Podcasts & Videos
Security firm ESET identified a sample of BIOS-based malware in the wild, with the Russian Hacking Group Fancy Bear believed to be responsible. Firmware security expert and Lastline co-founder and CTO, Giovanni Vigna, discusses the truth and hype around LoJax and other firmware based attacks with Paul Roberts of The Security Ledger.
Podcasts & Videos
SecurityGuyTV host, Chuck Harold, interview with Giovanni Vigna in which they discuss AI and ML, malware as a cyberweapon, triaging to improve efficiency, anomaly detection, and more.
Podcasts & Videos
Vince Tocce, a Bay Area podcast and video producer, interviewed Co-founder Giovanni Vigna at RSA 2018. They discussed the history of Lastline, AI at a security tool, automated detection of Android vulnerabilities, GDPR, and much more.
Podcasts & Videos
In this interview with Ashwin Krishna of Cyber Security Dispatch, Giovanni shares his insight on technical superiority, buzz word trends, and how triage is the most overlooked and probably the most impactful aspect of security operations today.
Podcasts & Videos
While at Infosecurity Europe in June 2018, Patrick Bedwell, head of product marketing at Lastline, discussed with iSMG malware trends, the challenges faced by infosec professionals, and why it’s essential to detect and remediate an attack.
Podcasts & Videos
In this interview with iSMG, Christopher Kruegel, CEO at Lastline shares key findings from new research conducted emphasizing that malware is a pervasive problem that is constantly evolving
Podcasts & Videos
In this interview with iSMG, Giovanni Vigna, CTO at Lastline, discusses what machine learning in particular can - and cannot - do to improve cybersecurity defenses.
Podcasts & Videos
Breakout presentation at Black Hat 2015 by Lastline co-founder Engin Kirda on how ransomware has evolved, the difference between threatened and actual impacts, and key attributes that makes ransomware both effective and detectable. (TRT: 23:18)
Podcasts & Videos
Watch Lastline co-founder Engin Kirda’s presentation to the NY Information Security Meetup on evasive malware and automated malware detection, including a brief history of malware attacks and how it evolves. (TRT: 25:07)
Podcasts & Videos
This demonstration shows how easy it is for PhishMe Triage users to add Lastline’s advanced malware detection to existing security tools and the resulting increased insight available through Triage. (TRT: 8:26)
Podcasts & Videos