Quarterly Threat Trends

For vendors in the security industry, enterprises, and partners

News about threats can’t wait. In our quarterly threat trends updates, we provide Webroot’s insights into the latest threats, relevant news, industry reports, and information to help you stay ahead of modern malware.

June 2019

In This Issue: Data Source Variety + Source Quality + Powerful Processing = Real Threat Intelligence

Not all data is created equal, according to Scott Crawford, research director of information security at 451 Research. Read why the data and its sources are critical to threat intelligence quality, then discover why data is just the beginning when it comes to producing contextual, actionable, predictive intelligence in our blog on machine learning-based threat intelligence platforms. Plus, you can watch how Webroot machine learning processes a never-before-seen URL to determine its threat potential, and hear from our threat intelligence partners on how they evaluate threat intelligence sources and vendors.

Not All Threat Data is Good Threat Data

The “actionability” of threat intelligence is based on the data’s scale, scope, timeliness, accuracy, prevalence, and context. Learn more about these 6 dimensions of threat intelligence, which are critical for effective security, in this 451 Research Special Report.

Read More

Defining a Machine Learning-Based Threat Intelligence Platform

To stop modern cyber threats, you have to harness next-generation technologies to bear the burden of analysis. Hear from Webroot CTO Hal Lonas on why a machine learning-based threat intelligence platform is critical.

Read Blog

Watch Webroot Process a Brand New URL

Machine learning is a complex process. See how the Webroot Platform applies this advanced technology and massive processing power to analyze and classify a never-before-seen URL in real time.

Watch Video

Why Use Webroot? Let a Partner Tell You

Hear from Webroot technology partners Clavister, F5, Rohde & Schwarz and ShieldX as they share how they evaluate security data sources, and why they’re a key differentiator in choosing a threat intelligence provider.

Watch Video

Learn more about Webroot Threat Intelligence.

Have more questions?