Matt is SVP of Sales at Endgame, leading his teams with a consultative, client-value centric approach. Prior to Endgame, he led SecureWorks' Americas Enterprise teams for over 11 years to record revenue growth up through its 2016 IPO. Matt's career started at CompuServe Network Services, a managed network services firm that grew from $40M to $300M in annual revenue prior to its acquisition by Worldcom. From 2001-2004, he was VP of Global Sales at Applied Innovation, a public-traded firm delivering network management solutions to major service providers.

Zero-day exploits refer to software vulnerabilities that have been found in-the-wild before security researchers and software developers become aware of the threat. Because of this, they pose a higher risk to users than other vulnerabilities.
A virus is a computer program that can copy itself and infect a computer without a user’s permission or knowledge.
A vulnerability is a security weakness typically found in programs and operating systems leaving computing systems open to malware and hacker attack. When vulnerabilities are exposed, software vendors will provide fixes or patches for their products.

A variant refers to a new version of malware based on existing malware with modifications. Today’s cybercriminals continually modify malware in order to improve or get as much mileage as possible from it. Variants help researchers differentiate versions based on their routines and other specific characteristics, and are used to identify and recommend solutions to remove or defend against them.

Threat hunting as an essential component of security. It is the proactive, stealthy, and surgical detection and eviction of adversaries inside your network without known indicators of compromise. Hunting is an offense-based strategy; hunting is thinking like the attacker.
Threats are security issues that include the following: malware, grayware/adware, spyware, spam, phishing, and bots/botnets.

A targeted attack refers to a type of threat in which threat actors actively pursue and compromise a target entity’s infrastructure while maintaining anonymity. These attackers have a certain level of expertise and have sufficient resources to conduct their schemes over a long-term period. They can adapt, adjust, or improve their attacks to counter their victim’s defenses.