Two krb5 Vulnerabilities Fixed in Debian: Patch Your Systems Now

krb5, the MIT implementation of Kerberos, is a widely used protocol for network authentication. Recently, two critical vulnerabilities have been discovered in the GSS message token handling in krb5, which could allow ...

Atlassian Confluence Data Wiping Alert

In today’s digital landscape, ensuring the security and integrity of your data is paramount. Atlassian, a prominent software company, recently issued a crucial advisory regarding Confluence, a popular collaboration and document management ...

GitLab Security Patches: Safeguarding Your Data

GitLab recently released critical security upgrades in order to improve the security of its widely used open-source code repository and DevOps collaborative software development platform. These GitLab security patches are intended to ...
How Machine Identity Management Helps Solve Connected Medical Devices Security Challenges With Ravishankar Chamarajnagar, CPO at AppViewX

How Machine Identity Management Helps Solve Connected Medical Devices Security Challenges With Ravishankar Chamarajnagar, CPO at AppViewX

Welcome to our latest blog post featuring an insightful conversation with Ravishankar (Ravi) Chamarajnagar, Chief Product Officer (CPO) of AppViewX. In this edition, we delve into the intriguing realm of the Internet ...

Integrity: How It’s More than Just Data Security and FIM

Integrity is a word thrown around a lot in the cybersecurity space. That’s not surprising. It is one of the three components that make up the CIA Triad, after all. However, the ...
auguria, data, graph, logging IP value data

The Value of Data From a Consumer Perspective

As more consumers give up more of their personal information, they may be unaware of the value that data holds Personal data, and the need to secure it, has been prominent in ...
Security Boulevard
online marketplace, e-commerce, hacking data

Garbage In, Gospel Out: The Security Problem of Data Accuracy

The accuracy or integrity of data is only as good as its source In two separate incidents, one in Colorado and one in Washington, D.C., police at gunpoint stopped people who were ...
Security Boulevard

Dark Data: the risk of missing out

If you ever used a computer, you are most likely guilty of creating dark data. This fairly new term is also known as “dusty data”, precious data collecting dust on our machines ...