The hardest part of maintaining a security defence is figuring out the things we don’t know – but by applying monitoring to all network traffic and simplifying accessibility to analytics tools, it’s easier than ever to ferret out new malware and seal perimeters that have been compromised by mobile devices, a Palo Alto Networks analyst has advised. While the security solutions market has been flooded with new options for identifying and dealing with malware, “you need to be able to feed it into something that’s actionable, and is going to help the business and actually give you some protection,” Williamson told CSO Australia after his presentation at the AusCERT 2013 security conference. Analysis of 839 different pieces of malware, and 204 million logs, also found that 55% of all malware uses custom UDP (User Datagram Protocol) packets to communicate with command-and-control (C&C) servers; therefore, when a scan of network activity shows that 1.5% of traffic is comprised of unknown UDP packets, Williamson said, it’s not hard to figure out where it’s coming from.