Read how these capabilities can enhance visibility across legacy and cloud domains, analyze network traffic to detect threat tactics and abuses of security policies, improve reposes with automation, clarify remediation requirements, and more.
SANS Instructors Mathias Fuchs and Joshua Lemon provide actionable advice to assist organizations as they grow their threat hunting programs and improve their abilities, whether they are new to threat hunting or are simply honing their processes.
Organizations just starting their threat hunting journey have different needs than those who are honing their skills and programs. This report looks at those differences and how they impact the priorities set by both types of organizations.
IDC analyst Chris Rodriguez and Lastine head of threat Intel, Richard Henderson, discuss the how IDPS technology has failed to keep up with today’s cybersecurity challenges, and alternatives that filling the gaps.
Gartner recommends adding Network Detection and Response (NDR) to your SIEM and EDR to improve threat detection. Learn how this SOC Visibility Triad can deliver high-fidelity alerts with relevant context to make your SOC analyst more productive.
IDPS software deployed several years ago have not evolved beyond signatures and low-level network protocol analysis, leaving them ill-equipped to detect evasive threats. This paper explores the five most common complaints we hear when our customers describe their IDPS.
In a video interview at 2019 InfoSecurity Europe, Lastline co-founder and CTO, Dr. Giovanni Vigna, discusses how gamification can play an important role in attracting and retaining cybersecurity talent, a "positive pyramid scheme" to build talent, and finding expert talent in other fields.
Lastline CEO, John DiLullo, will use 5 notorious cyberattacks to illustrate how AI — including expert systems, deep learning, and supervised and unsupervised machine learning — is essential for detecting sophisticated threats.
Public cloud workloads are at risk as bad actors target unsecured servers and vulnerable data in the public cloud. They take advantage of limited security controls as organizations migrate workloads to the cloud, leaving applications and data exposed. Lastline Defender now protects public cloud workloads against advanced threats attempting to enter or move laterally in your AWS environment. Watch our introductory webinar.
Lastline's John DiLullo on Tracking Adversaries' Network Movements. It's not enough to detect an attack. To be truly effective, defenders need to capture digital fingerprints and movement through the network. John DiLullo of Lastline discusses this level of defense.
Giovanni discusses the difference between machine learning and AI, how criminals are turning ML against us, alert triaging, the effective use of anomaly detection (spoiler: it’s not threat detection), CISOs as goalkeepers, and more.
Security firm ESET identified a sample of BIOS-based malware in the wild, with the Russian Hacking Group Fancy Bear believed to be responsible. Firmware security expert and Lastline co-founder and CTO, Giovanni Vigna, discusses the truth and hype around LoJax and other firmware based attacks with Paul Roberts of The Security Ledger.
Vince Tocce, a Bay Area podcast and video producer, interviewed Co-founder Giovanni Vigna at RSA 2018. They discussed the history of Lastline, AI at a security tool, automated detection of Android vulnerabilities, GDPR, and much more.
In this interview with Ashwin Krishna of Cyber Security Dispatch, Giovanni shares his insight on technical superiority, buzz word trends, and how triage is the most overlooked and probably the most impactful aspect of security operations today.
While at Infosecurity Europe in June 2018, Patrick Bedwell, head of product marketing at Lastline, discussed with iSMG malware trends, the challenges faced by infosec professionals, and why it’s essential to detect and remediate an attack.
BrightTALK caught up with Lastline co-founder and CTO, Dr. Giovanni Vigna, for an in-depth conversation on the current state of information security, today's threats cape, and the role of AI and machine learning.
Breakout presentation at Black Hat 2015 by Lastline co-founder Engin Kirda on how ransomware has evolved, the difference between threatened and actual impacts, and key attributes that makes ransomware both effective and detectable. (TRT: 23:18)
Lastline CEO, Chris Kruegel’s, breakout session presentation at Black Hat 2015 on automated vulnerability analysis, how to search for firmware vulnerabilities, and specific examples of vulnerabilities he has discovered. (TRT: 47:30)
Watch Lastline co-founder Engin Kirda’s presentation to the NY Information Security Meetup on evasive malware and automated malware detection, including a brief history of malware attacks and how it evolves. (TRT: 25:07)
This demonstration shows how easy it is for PhishMe Triage users to add Lastline’s advanced malware detection to existing security tools and the resulting increased insight available through Triage. (TRT: 8:26)