Quarterly Threat Trends
For vendors in the security industry, enterprises, and partners
News about threats can't wait. In our quarterly threat trends updates, we give a by-the-numbers account of Webroot's insights into the latest threat issues. Additionally, look for relevant news, industry reports, and information to help you stay ahead of modern malware.
September 2016
In This Issue: Now you see it, now you don't
Recent threat trends can be deceiving. The number of phishing attacks and malware encounters are decreasing, but don’t be fooled. Threats are only becoming more targeted and devious, as polymorphic malware appears, inflicts damage, and disappears before traditional defenses can respond. This quarter, we explore the latest threat statistics, the Webroot vision from CTO Hal Lonas, and guest analysis from ESG and Forrester.
The Brains Behind the Tech
Meet the visionary behind Webroot threat intelligence, Chief Technology Officer Hal Lonas. Hal led the move to machine classification of URLs almost a decade ago, and his team of rocket scientists continues to develop innovative approaches to finding and blocking the latest threats.
ESG: Keeping up with the Speed of Morphing Threats
by Jon Oltsik, Senior Principal Analyst, ESG
Today’s threats morph at a lightning pace, underscoring the need for timely, accurate, and actionable threat intelligence to keep up with changes and provide the right foundation for threat analysis and remediation.
Read MoreForrester: The State of the Cyberthreat Intelligence Market
by Rick Holland, Former VP & Principal Analyst, Forrester
Threat intelligence is one of the hottest topics in the security industry. But, amidst the flurry of market activity, it can be difficult to know which sources to invest in. Find out how S&R pros can ensure they choose TI that lives up to the hype.
Read MoreThe Webroot BrightCloud Threat Investigator
Webroot analyzes connections between URLs, IPs, files, and mobile apps to offer accurate insight for investigation, response, and prevention. See the breadth and depth of contextual data in action, and learn how it provides predictive protection from unknown threats.
Read MoreHave more questions?