The Only Acceptable Sacrifice

Posted by Jeff Pollard on 6/5/15 11:00 AM

A few days ago I was having a conversation with a customer I’ve known for a number of years when the subject of recent big name vulnerabilities came up. Shellshock, Heartbleed, Venom and, most recently, the Diffie-Hellman 512-Bit Export Key issue. We were discussing the challenge these items present to both vendors and customers because of the numerous hardware and software elements contained versions of the vulnerable software. As our conversation progressed, a theme began to emerge — the problem for customers primarily rests in the fact that these portions of the security stack are often acting as compensating controls for some other issue that can’t be fixed yet – or fixed at all. Too often these were compensating for a lack of budget, time or capability inherited from the original technology causing the problem.

Read More

Bridging Network and Endpoint Security with New Rapid Host Breach Verification

Posted by Brian Laing on 5/18/15 11:00 AM

Today we announced the expansion of the Lastline Breach Detection Platform to bridge network and endpoint security with new host breach verification features. Combined with existing network breach verification, the new endpoint breach verification tools and integrations will give SOC operators, incident responders, security management and MSSPs a unified, comprehensive and timely view into indicators of compromise (IOCs) across networks and endpoints. This makes detection and response to breaches faster and more focused.

Read More

Topics: host breach verification, Structured Threat Information eXpression, STIX, OpenIOC

All the Kids Get to Play in Our Sandbox

Posted by John Bradshaw, Vice President, Worldwide Sales Engineering, Lastline on 4/29/15 11:00 AM

As I took on a global manager role these past few years, I have had to evaluate different solutions that would help my team do their job better. Quite the reversal from being the vendor wanting to show prospects the solution I sell and proving to them it will meet their requirements. I have learned several lessons from this experience, one of which is that robust integrations with a rich API are a cornerstone requirement – this allows me to choose Best of Breed in each solution area I invest.

Read More

Topics: Integration, Sandboxing, APIs

Lastline Info Security 2015 Medal Count: 1 Gold, 3 Bronze

Posted by Matthew Baker on 4/21/15 11:30 AM

products-guideAt last night’s 11th Annual Info Security 2015 Global Excellence Industry Awards banquet, we brought home one gold and three bronze medals. What a great way to kick of this year’s RSA show!

Most notably, our team was named the “Gold Winner” for the Most Innovative Security Product (Software) of the Year category. With a founding team that holds over a decade of experience researching threats in the cyber security space, it’s an honor to be recognized for what the company has been able to accomplish thus far.

Read More

Topics: Lastline News, Awards, Industry Recognition

Extinction Level Event: Evolution of the Sandbox

Posted by John Bradshaw, Vice President, Worldwide Sales Engineering, Lastline on 4/17/15 11:08 AM

Moore's LawAn Extinction Level Event occurs when something rapid and cataclysmic happens upsetting the natural order of things to such a degree that species are not able to adapt quick enough and die off in rapid fashion. In the natural world, these events are rare with only five major extinction events recorded in Earth’s history – and some scientists claim we are now in a sixth major extinction event. However, the cyber world is evolving at a much faster pace. Moore’s Law describes the exponential rate of computing power and how it increases every two years. Right along with these increases in sheer computing power have come advances in both information security capabilities and methodologies used by advanced threat groups to thwart those gains. In technology we expect rapid extinction cycles — and we are on the verge of witnessing another cyber security extinction level event now.

Read More

Topics: Malware Sandboxing Analysis, Full-system Emulation

Verizon's 2015 DBIR Featuring Lastline Data is Out!

Posted by Ashley Kiolbasa on 4/14/15 1:30 PM

Verizon’s annual Data Breach Investigations Report (DBIR), has become one of the most anticipated information security industry reports of the year. Now in its eleventh year, the 2015 DBIR continues the tradition of analyzing threats and vulnerabilities that lead to some of the largest security incidents of the past year and quantifying the impact on those organizations affected. 

images-4Verizon's security researchers compiled data from nearly 80,000 security incidents and more than 2,000 data compromises from 61 countries. Contributions from several forensics firms, government agencies, and security researchers, including Lastline Labs, help to provide detailed findings on 2014 incident and make this one of the most collaborative, data-driven information security reports available.  

Lastline is honored to be included in this comprehensive report that helps to drive continuous action and improvement throughout the entire security community year after year. 

You can download the full 2015 Verizon Data Breach Investigations Report here

Read More

Topics: DBIR, 2015 Data Breach Investigations Report, Verizon, Lastline Labs

You Are The Weakest Link – Goodbye!

Posted by John Bradshaw, Vice President, Worldwide Sales Engineering, Lastline on 4/7/15 7:00 AM

I am sure everyone remembers the TV Game Show, The Weakest Link, where host Anne Robinson in the end would notify the team member who answered the most questions incorrectly during the round that they were “The Weakest Link – Goodbye!” and repeat the process until there was a winner.

As security practitioners, we must constantly assess where our weakest links are within our operational workflow. This is a continuous evaluation, and designating a weakest link only means you have identified an area that currently requires more focus and refinement to get the best possible results.

Read More

Topics: SOC Analyst, CISO

Lastline Named a Finalist for SC Magazine 2015 Awards Europe

Posted by Matthew Baker on 3/24/15 11:00 AM

11th Annual 2015 Info Security's Global Excellence AwardsTop information security research and business information site SC Magazine has recognized Lastline as a finalist for its 2015 SC Magazine Awards Europe.

Category: Best Advanced Persistent Threat (APT) Protection

As part of the IT security industry's leading global awards program, SC Awards Europe was organized to honor the professionals, companies and products that help fend off the myriad security threats confronted in today's corporate world. 

These prestigious, highly-competitive awards recognize security and IT vendors with advanced, ground-breaking products and solutions that are helping set the bar higher for others in all areas of security and technologies. We are honored to be nominated.

Stay tuned to this blog for more, as winners will be announced June 2nd! 

Read More

Topics: Lastline News, Awards

Kernel Rootkit Analysis with Lastline Breach Detection Platform 6.5

Posted by Brian Laing on 3/17/15 10:00 AM

Today at SXSW Interactive, Lastline co-founder and chief architect Engin Kirda presented new insights into malware in the wild including new research coming out of Lastline Labs on high resolution dynamic analysis of Windows kernel rootkits. We also announced today a new analysis capability in the 6.5 release of the Lastline Breach Detection Platform that provides unprecedented insights into this pernicious type of malware hidden in the kernel of Microsoft Windows operating systems.

Read More

Topics: Malware Sandboxing Analysis, Lastline Breach Detection Platform, Kernel Rootkit Analysis

Gartner Video: A New Generation of Sandboxing for the Next Generation of Threats

Posted by Freddy Mangum on 3/10/15 8:00 AM

The cyber threat landscape is dramatically changing, but one thing is certain – malware authors are becoming increasingly sophisticated, and most organizations are struggling to keep pace.

Read More

Topics: Evasive Malware, Lastline Breach Detection Platform, Gartner, Sandboxing

Subscribe to Email Updates