Webroot's machine learning and cloud mix evolves threat intelligence
HUNTING MALWARE in the vast virtual planes of the internet and amid the thousands of files on even the most basic PC is a challenge for the best cyber security boffins. Threat researchers can usually be found at cyber security companies sifting through data, analysing files and tracing the origins of malware down rabbit warrens of scripts, file paths and rogue code hiding behind seemingly harmless executable files. Once malware is found it can be squashed and measures can be put into place to protect other systems from similar attacks. This'threat intelligence' is an important part of protecting individuals and organisations against software vulnerabilities, viruses and hackers. "These services prioritise vulnerabilities and predict threats, enabling security teams to rapidly take action. More advanced services also integrate vulnerability alerting with real-world threat intelligence covering geopolitical and business intelligence," said the UK Computer Emergency Response Team.
Mar-22-2016, 19:31:25 GMT