[TheRecord] Report: China’s network security spending set to double in first half of 2021

China is set to increase its spending on network security by 110 percent in the first half of the year to $1.1 billion when compared with 2020 — that’s a year-on-year increase of 38 percent compared with 2019, according to a new report by the marketing intelligence firm, IDC.

The appetite for network security products and services is partly a result of the Cybersecurity Law China promulgated in 2017 that, among other things, has required network operators to store much of their data in-country. The result has been a run on everything from products and services for traditional network testing and monitoring to creating a new market for cloud providers and hosting services, the report said.

Security consultancy spending, for example, rose an eye-popping 172 percent year-on-year, the report said. (COVID likely put a crimp in the market last year, the report said, because lots of consulting services were put on hold during various lock-downs. Now, it said, they have returned with a vengeance.)

Also adding to the breakneck growth: an increase in so-called “smart city” spending and other infrastructure-related projects that have required a generation of training people to understand network systems.

The report said China’s server market also saw a boom, increasingly 85.1% year-on-year, to $2.19 billion. GPU servers made up 91.9 percent of the purchases, the report said, and Inspur, Ningchang, and Huawei accounted for about 70 percent of the market.

The post Report: China’s network security spending set to double in first half of 2021 appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[SANS ISC] Log4Shell exploited to implant coin miners, (Mon, Dec 13th)

All posts, Sans-ISC

Analyzing the ISC honeypots’ requests, I found out that coin miners just included Log4Shell into their arsenal.  The request that hit our honeypot is trying to make vulnerable log4j load the address ‘jndi:ldap://45[.]83.193.150:1389/Exploit’. This will make log4j load and instantiate a malicious payload hosted at ‘http://31[.]220.58.29/Exploit.class’. I could find the payload address by doing a […]

Read More

[SecurityWeek] CISA Issues Guidelines on Choosing a Managed Service Provider

All posts, Security Week

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued new  guidelines for government and private organizations to take into consideration when looking to outsource services to a Managed Service Provider (MSP). read more Source: Read More (SecurityWeek RSS Feed)

Read More

[BleepingComputer] Over 60,000 domains parked at MarkMonitor could be taken over

Domain registrar MarkMonitor had left more than 60,000 parked domains vulnerable to domain hijacking. The parked domains were seen pointing to nonexistent Amazon S3 bucket addresses, hinting that there existed a domain takeover weakness. […] Source: Read More (BleepingComputer)

Read More