In the past, new malware could be individually detected, catalogued, and blocked by security companies. Malicious fi les were identifi ed by their unique fi le hash, aka “signature,” and restricted from running by signature-based security solutions. Today, threat actors release over nine million new malware variants per month2. The sheer number of unique threats being generated today greatly reduces the e‑ ectiveness of a signature-based security approach.