<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Using the security.txt file Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/using-the-security-txt-file/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/using-the-security-txt-file/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:03:53 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Using the security.txt file Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/using-the-security-txt-file/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 099 Using the security.txt file</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 15 Oct 2021 07:15:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Reporting a Data Breach]]></category>
		<category><![CDATA[Reporting Data Breaches]]></category>
		<category><![CDATA[Security Researchers]]></category>
		<category><![CDATA[security.txt]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Using the security.txt file]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2627</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file. Why is this a thing If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file.<span id="more-2627"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2627-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4</a></video></div>
<h3>Why is this a thing</h3>
<p>If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data on some underground forums, where they might try and sell it to other criminal gangs, for their use.</p>
<p>But there are also, usually, good guy security researchers in those forums too, keeping an eye on things. If they come across some company’s data being trying to be sold, they may try to notify the company that there has been a breach as they may not be aware of it. Sometimes the security researchers find it difficult to get through to these companies to make contact with somebody that they can discuss this data breach.</p>
<h3>How can using the security.txt file help</h3>
<p>That’s where the security.txt file comes in. This is just a simple text file that contains some contact information for somebody in the security area or in IT. Somebody that would be reachable by email and maybe if you want to do it securely they may also include the public encryption key for the email to make sure that all communications are kept secured so that the security researchers can reach out and contact the company. They can use the contact address and get in touch there to report the data breach and maybe other vulnerabilities that they may have discovered.</p>
<h3>Where can I find out more</h3>
<p>So it&#8217;s always good to have this and it&#8217;s usually placed on your website in a well-known location. Here is the <a href="https://securitytxt.org/" target="_blank" rel="noopener">security.txt proposed standard</a>.</p>
<p>So if you have a website, set-up this security.txt file for it.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4" length="35355646" type="video/mp4" />

			</item>
	</channel>
</rss>
