This quarter, we provide extensive background on the evolution of phishing and review the latest phishing statistics. We also explore machine learning, a critical technique in phishing detection, with insight from Webroot CTO Hal Lonas, Gartner, and ESG analyst Jon Oltsik.
Phishing: no longer casting a wide net
Phishing remains one of the most challenging threats to identify, but attackers have changed course. The latest tactics use pinpoint precision to target specific companies and individuals, going for quality over quantity. Learn more about the dangers of phishing and which companies are the most desirable catch.
Man + machine learning = superior threat intelligence
The volume of data to be analyzed and the speed at which threats evolve requires more than manual analysis to keep pace. Webroot CTO Hal Lonas explains why machine learning is the game changer in threat intelligence.
The war has begun & data is at stake
by Hal Lonas, CTO, Webroot and featured Gartner research
These articles present Webroot's position on delivering threat intelligence through cloud-based machine learning with scale, speed, and accuracy, as well as Gartner research on innovations in machine-readable TI.
Operationalizing TI by integrating into security controls
by Jon Oltsik, Senior Principal Analyst, ESG
Many organizations are building threat intelligence programs, but acting on mountains of threat data is challenging and staffing shortages compound the problem. So what’s the solution?
Automating threat defense: using machine learning to prevent modern cyberattacks
“Machine learning” may be a frequently used term, but the techniques vary wildly. Arm yourself with accurate information for the next conversation on the subject.