Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience
January 27, 2019
Help Net Security – Researchers analyze DDoS attacks as coordinated gang activities In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors and exhibit similar behavior among the various attacks conducted by the same gang.
Cloud Expo Asia Hong Kong
January 27, 2019
Cloud Expo Asia Hong Kong May 22-23, 2019 HKCEC, Hong Kong
Telecom Exchange NYC 2019
January 27, 2019
Telecom Exchange NYC 2019 May 14-15, 2019 The W Hoboken Hotel
RSA Conference 2019
January 26, 2019
RSA Conference 2019 March 4-8, 2019 Moscone Center, San Francisco, CA
IP Reputation Report-01252019
January 25, 2019
-
Top 10 countries in attack counts:
- The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 25, 2019.
- CN increased 1% from 43% to 44% and US stayed at 12% from last week.
Mobile Office — Two-Step Verification
January 25, 2019
Case Analysis
It is a common practice to protect an account with a password. However, the account will be compromised if the password is disclosed. Now many mobile phones or apps support two-step verification. When detecting a login to your account from another phone, the mechanism requires the other form of authentication, for example, a verification code sent via SMS.
Technical Report on Container Security (IV)-4
January 24, 2019
Container Security Protection – Image Security
Image Security
Images are the basis of containers. Therefore, their security speaks a lot for that of the entire container ecosystem. Container images are a series of images stacked layer by layer. They are distributed and updated through image repositories. The following sections describe how to secure images from the aspects of image build security, repository security, and image distribution security. (more…)



