Quarterly Threat Trends

For vendors in the security industry, enterprises, and partners

News about threats can't wait. In our quarterly threat trends updates, we give a by-the-numbers account of Webroot's insights into the latest threat issues. Additionally, look for relevant news, industry reports, and information to help you stay ahead of modern malware.

December 2016

In This Issue: Like phish in a barrel

This quarter, we provide extensive background on the evolution of phishing and review the latest phishing statistics. We also explore machine learning, a critical technique in phishing detection, with insight from Webroot CTO Hal Lonas, Gartner, and ESG analyst Jon Oltsik.

Phishing: no longer casting a wide net

Phishing remains one of the most challenging threats to identify, but attackers have changed course. The latest tactics use pinpoint precision to target specific companies and individuals, going for quality over quantity. Learn more about the dangers of phishing and which companies are the most desirable catch.

Read More

Man + machine learning = superior threat intelligence

The volume of data to be analyzed and the speed at which threats evolve requires more than manual analysis to keep pace. Webroot CTO Hal Lonas explains why machine learning is the game changer in threat intelligence.

Watch Video

The war has begun & data is at stake

by Hal Lonas, CTO, Webroot and featured Gartner research

These articles present Webroot's position on delivering threat intelligence through cloud-based machine learning with scale, speed, and accuracy, as well as Gartner research on innovations in machine-readable TI.

Read More

Operationalizing TI by integrating into security controls

by Jon Oltsik, Senior Principal Analyst, ESG

Many organizations are building threat intelligence programs, but acting on mountains of threat data is challenging and staffing shortages compound the problem. So what’s the solution?

Read More

Automating threat defense: using machine learning to prevent modern cyberattacks

“Machine learning” may be a frequently used term, but the techniques vary wildly. Arm yourself with accurate information for the next conversation on the subject.

Read More

Learn more about Webroot Threat Intelligence.

Have more questions?