This white paper discusses a new approach, detecting the bad or malicious to cyber security: validating the known.
Although there are new innovative new offerings in the cyber security market, the majority of today’s technologies take fundamentally the same approach.
A new approach is validating the known, looking to validate objects as good or valid as compared with a certified list of known files or objects.
Objects that cannot be validated are treated as untrusted. The binary good versus bad classification gives way to validated good and invalidated.