<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>cybersecurity</title>
    <link rel="self" type="application/atom+xml" href="https://gleipne.volse.net/guest/tags/133/feed"/>
    <updated>2026-05-23T08:40:03+00:00</updated>
    <id>https://gleipne.volse.net/guest/tags/133/feed</id>
            <entry>
            <id>https://gleipne.volse.net/links/123</id>
            <title type="text"><![CDATA[Honeytoken - Wikipedia]]></title>
            <link rel="alternate" href="https://en.wikipedia.org/wiki/Honeytoken" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/123"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2023-07-26T17:34:42+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/122</id>
            <title type="text"><![CDATA[What Are Honey Tokens?]]></title>
            <link rel="alternate" href="https://www.fortinet.com/resources/cyberglossary/honey-tokens" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/122"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Honey tokens have data made and monitored to catch digital thieves. They contain a marker, which is fake data that looks like a valuable asset to a thief but has no real value for the organization.]]>
            </summary>
            <updated>2023-07-26T17:32:38+00:00</updated>
        </entry>
    </feed>
