Hiring a Cybersecurity Provider Isn’t Just a Convenience, It’s Your Fiduciary Duty

No enterprise executive can be blamed for hesitating to transfer network security responsibilities to a third party, no matter how qualified that third party may be. Data, after all, is the modern enterprise’s most prized possession. Still, business decision-makers must ask themselves whether the expense of an in-house cybersecurity infrastructure is the best option. The…

By

Ransomware: A Real Horror Story

As we observe the holiday of all things scary, it seems like the perfect time to talk about something really frightening: ransomware. Ransomware, one of the most prevalent threats to companies’ cybersecurity, cost companies $24 million last year. And that cost is rising at an unprecedented rate. In the first three months of 2016, costs escalated…

By

How the Grinch Stole IoT

Level 3 Threat Research Labs has previously reported on a family of malware that exploits Internet of Things (IoT) devices to create distributed denial of service (DDoS) botnets. With a rapidly increasing market for these devices and little attention being paid to security, the threat from these botnets is growing.  Level 3 Threat Research Labs…

By

Anatomy of a Nation State Hack

Nation states are working hard to build up their economies and strengthen their key businesses – in some cases by using stolen intellectual property and other valuable information hacked from companies and government agencies around the world. We know this because we regularly observe their activities. The typical nation state hacking operation involves a fairly…

By