Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

RedLock

Below you will find reports with the source of “RedLock”

image from Defending Against Cryptojacking In AWS, Azure, and GCP

Defending Against Cryptojacking In AWS, Azure, and GCP

From the report, “As the hype and soaring price of cryptocurrency has drawn in thousands of new players worldwide, generating a single bitcoin takes a lot more servers than it used to. (more available)
Added: February 12, 2019
image from 4 Trending Threats To Public Cloud Security

4 Trending Threats To Public Cloud Security

This infographic offers a brief look into the Cloud Security Trends May 2018 report.
Added: February 12, 2019
image from Cloud Security Trends: May 2018

Cloud Security Trends: May 2018

This report offers 14 tips to fortify your public cloud environment. From the report, “This edition of RedLock’s Cloud Security Trends marks the report’s one year anniversary, and it’s been a sobering year in terms of public cloud breaches, disclosures and attacks. (more available)
Added: February 12, 2019
image from Cloud Security Trends: February 2018

Cloud Security Trends: February 2018

This is a report on cloud security trends.
Added: October 26, 2018
image from Cloud Security Trends: October 2017

Cloud Security Trends: October 2017

This is a report on cloud security trends.
Added: October 25, 2018
image from Cloud Security Trends Report Infographic February 2018

Cloud Security Trends Report Infographic February 2018

This is an infographic that summarizes the Redlock report of the same name.
Added: October 24, 2018
image from Cloud Security Trends: May 2017

Cloud Security Trends: May 2017

This is a report on cloud security trends.
Added: October 12, 2018
© Cyentia Institute 2023
Library updated: February 1, 2023 04:08 UTC (build 051771c)