(Updated for CounterMeasure 2016). Indicators of Compromise were meant to solve the failures of signature-based detection. Despite all of the IOC schemas, threat data feeds, and tools, attackers remain successful, and most threat data is shared in flat lists of hashes and addresses. We’ll explore why IOCs haven’t raised the bar, how to better utilize brittle IOCs, and how to use the data intrinsic to your own endpoints to complement reliance on externally-sourced threat data.