Cyber Threat Alliance Members Issue First Collaborative Report on Cryptomining

  • 19 September 2018
  • 0 replies
  • 78 views

Userlevel 7
Badge +54
By Anthony Giandomenico | September 19, 2018 

Competition between security vendors is a critical component of staying ahead of cybercriminals. While the bottom line is undoubtedly essential, competing for market share and customers also forces security vendors to continually improve their technologies. Someone makes a breakthrough, such as the invention of the Next-Gen Firewall or sandboxing, or the addition of machine learning and AI, and soon everyone is offering a version of that technology, and each iteration is an improvement over the last.
 
Most of the major security vendors have also invested heavily in teams and technologies that collect, correlate, deconstruct, and build responses to threats. These teams often gather live threat intelligence from thousands, or even millions of their own devices distributed around the world. These threat research engineers also develop and use advanced technologies, combined with the sometimes tedious work of hands-on reverse engineering and analysis, to understand threat trends and tactics of the cybercriminal community. That information is then loaded directly into the devices of their customers to keep them safe from live threats.
 
Full Article.

0 replies

Be the first to reply!

Reply