Cloud-based threat aggregation replacing “self-defeating” signature-based security as endpoints diversify

(Source: CSO Australia) That approach, which has become commonly used by a range ofsecurity vendors, adopted a strength-in-numbers philosophy that saw threats aggregated and …