Professional Documents
Culture Documents
What Are Unknown Cyberthreats
What Are Unknown Cyberthreats
Cyberthreats?
5min. read
Most traditional security products are built to act based on known threats.
The moment they see something that is known to be malicious, they block it.
To get past security products that successfully block known threats,
attackers are forced to create something that has never been seen before,
increasing the cost to execute an attack. How do they do it, and what can
we do to prevent both known and unknown threats?
Recycled Threats
Turning unknown threats into known threats and actively preventing against
them happens in a combined environment. First, you need to predict the
next attack step and location. Second, you need to be able to develop and
deliver protection quickly to the enforcement point in order to stop it.
Automate Protections
When a truly new threat enters your organization, the first line of defense is
having cybersecurity best practices that are specific to the organization. At
the same time, you should be sending unknown files and URLs for analysis.
The effectiveness of sandbox analysis depends on the time it takes to
provide an accurate verdict on an unknown threat and to create and
implement protections across the organization, as well as how your sandbox
environment handles evasive threats. Your security posture needs to be
changed fast enough to block the threat before it has the ability to progress
– in other words, as soon as possible. And to ensure that this threat does
not further traverse the network, preventions need to be created and
implemented automatically across all security products faster than the threat
can spread.