ethical-hacker video for given a scenario where an organization needs to assess the risk associated with new malware signatures detected by their IDS, which
Given a scenario where an organization needs to assess the risk associated with new malware signatures detected by their IDS, which technique would best help in correlating this information with external threat databases?