Product & Technology (2)

September 25, 2019

Going Beyond Files: Destructive Object Analysis

Malware analysis adapts in response to more complex destructive objects
July 26, 2019

Automated Static Analysis vs. Dynamic Analysis - Better Together?

Dynamic File Analysis is undoubtedly a vital tool for cyber defense, but its utility as malware analysis technology continues to increase in sophistication.
June 27, 2019

The Power of Automated Static Analysis

Automated static analysis is not subject to traditional virtualization and sandbox evasion techniques and takes place in milliseconds, regardless of file type, size, target OS or platform.
December 13, 2018

Machine Learning: A Belt and Suspenders Approach

A belt and suspenders strategy won't win you any fashion awards, but it can save you from embarrassingly being caught with your pants down in a successful cyber-attack. However, unlike wearing two devices to hold up your pants, cybersecurity professionals can combine overlapping technologies to provide significant synergies that exceed the sum of their parts. That makes a belt and suspenders approach a sound strategy for cybersecurity.
August 2, 2018

Why Build a Local Threat Intelligence Infrastructure with Automated Static Analysis?

At a recent FS-ISAC event, I listened to a cybersecurity analyst explain that a majority of the global (external) threat intelligence he receives is useless for his organization.