Part four of a five-part blog series on cloud security
Part four of a five-part blog series on cloud security
Part three of a five-part blog series on cloud security
Part two of a five-part blog series on cloud security
Part one of a five-part blog series on cloud security
Part five of a five-part blog series on cloud security
TLS adoption has grown rapidly, with nearly 100% of website connections now delivered over HTTPS. Now, firewalls must do more than simply block threats—they need to provide advanced decryption capabilities to detect hidden dangers, while maintaining performance, all without compromising the speed of business operations. Security shouldn’t come at the cost of performance Many firewalls […]
In October 2024, 421k unique email addresses from the virtual earth game Earth 2 were derived from embedded Gravatar images. Appearing alongside player usernames, the root cause was related to how Gravatar presents links to avatars as MD5 hashes within consuming services, a feature Earth 2 advised has now been disabled on their platform. This incident did not expose any further personal information, passwords or financial data.