Bert Rankin Tag

Your organization's C-Suite isn't the only target at risk of cyberattacks. Cybercriminals frequently target human resources (HR) departments, with the goal of collecting financial and personally identifiable information (PII). HR departments are not only more likely to have cybersecurity vulnerabilities, but they are also the...

In 2014, Lastline published a blog titled “Web Security for Advanced Malware and Persistent Threats”. Four years later it remains a very popular post—describing how Lastline compliments Secure Web Gateways (SWGs) to dramatically bolster web security—particularly against Advanced Persistent Threats (APTs). A lot has changed since...

Understanding how malware works, and in particular, the strategies and tactics most often used by malware authors is vitally important for cybersecurity professionals. In other blog posts, Lastline provides a brief history of malware and basic malware types. In this post, we’ll look at some...

Moscone Center bulged with over 42,000 attendees as another exciting RSA conference wrapped up last week in San Francisco. There was more than enough key takeaways from this security conference —  we will only cover a few sessions that sparked our interest. This year’s conference included...

As one might expect, this year’s RSA security conference is buzzing with Internet-of-Things (IoT) security and related presentations, products, and demonstrations. With dozens of vendors and workshops focused on securing and managing unknown devices, IoT security is certainly a hot topic for 2018 and beyond. From...

Machine learning has found application in a breadth of industries, from cancer detection to voice recognition to identity theft prevention. Perhaps unsurprisingly, cybersecurity is another area where machine learning can increase the efficiency and accuracy of operations. This is a topic generating a lot of discussion...

Identity theft continues to be a challenging and expensive risk for consumers, and malware that’s specifically designed to steal users’ account data and identities are often used to commit the crime. The reason for this persistent threat? Simple, identity theft is a very lucrative business for cybercriminals. The...

With no remedy in sight to the cybersecurity talent shortage, organizations must be creative, determined, and mobilized. Rather than focusing on what the organization doesn't have, cybersecurity professionals must instead get optimal performance from the resources they have ready and available. Through advanced cybersecurity technologies,...