About the Validation category

After threats are detected, they need to be validated with multiple sources and cross correlated with internal resources. This is the validation process, validating a malware hash with a third party data source uses an integration from the validation family.

Use this subcategory to discuss validation related issues and challenges that you may face validating threats with internal and third party data sources.