The process of detecting advanced malware threats is growing in complexity and in the sources of data and points to be analyzed. Certain tactics are well known and practiced, i.e. DNS fast fluxing, whitelisting/blacklisting, email tracking, pdf and image sandboxing, etc. The combination of these tactics plus more complicated behavior analysis needs to be automated in order to stay ahead of the bad actors as they quickly evolve. We will discuss these challenges and offer some ideas for solving the analysis automation in a world of big data – saving time and human resources in the fight against sophisticated hackers and rapidly emerging threats.
Read more >