<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Critical</title> <atom:link href="https://www.iphere.com/tag/critical/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Why Client-Side Encryption Is Critical For Cloud Privacy</title><link>https://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy</link> <comments>https://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy#comments</comments> <pubDate>Thu, 13 Mar 2014 02:15:06 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[ClientSide]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Privacy]]></category> <guid
isPermaLink="false">http://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy</guid> <description><![CDATA[The only way to ensure privacy in the cloud era is to shift to a model in which the cloud customer controls encryption keys, not the cloud provider. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Cisco ACI: 4 Critical Questions For Customers</title><link>https://www.iphere.com/cisco-aci-4-critical-questions-for-customers</link> <comments>https://www.iphere.com/cisco-aci-4-critical-questions-for-customers#comments</comments> <pubDate>Wed, 18 Dec 2013 14:12:43 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Customers]]></category> <category><![CDATA[Questions]]></category> <guid
isPermaLink="false">http://www.iphere.com/cisco-aci-4-critical-questions-for-customers</guid> <description><![CDATA[Networking customers considering Cisco ACI for their data centers will want to dig into the details of the SDN strategy. But they should also be asking these big-picture questions. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/cisco-aci-4-critical-questions-for-customers/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Critical Infrastructure Vulnerabilities Unearthed</title><link>https://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed</link> <comments>https://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed#comments</comments> <pubDate>Thu, 31 Oct 2013 08:18:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Infrastructure]]></category> <category><![CDATA[Unearthed]]></category> <category><![CDATA[Vulnerabilities]]></category> <guid
isPermaLink="false">http://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed</guid> <description><![CDATA[Researchers find 25 flaws in products used in power and water systems that attackers could exploit. In a separate study, researchers find vulnerabilities in a widely used vessel tracking system. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/critical-infrastructure-vulnerabilities-unearthed/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Dynamic Frequency Selection: Why It&#8217;s Critical In 802.11ac</title><link>https://www.iphere.com/dynamic-frequency-selection-why-its-critical-in-802-11ac</link> <comments>https://www.iphere.com/dynamic-frequency-selection-why-its-critical-in-802-11ac#comments</comments> <pubDate>Tue, 15 Oct 2013 02:26:15 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[802.11ac]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Dynamic]]></category> <category><![CDATA[Frequency]]></category> <category><![CDATA[It's]]></category> <category><![CDATA[Selection]]></category> <guid
isPermaLink="false">http://www.iphere.com/dynamic-frequency-selection-why-its-critical-in-802-11ac</guid> <description><![CDATA[DFS is the focus of much debate in the wireless industry. Here&#8217;s why it&#8217;s a crucial requirement with the arrival of 802.11ac devices. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/dynamic-frequency-selection-why-its-critical-in-802-11ac/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>VoIP Planning: 3 Critical Steps</title><link>https://www.iphere.com/voip-planning-3-critical-steps</link> <comments>https://www.iphere.com/voip-planning-3-critical-steps#comments</comments> <pubDate>Thu, 05 Sep 2013 20:16:04 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Planning]]></category> <category><![CDATA[Steps]]></category> <category><![CDATA[VoIP]]></category> <guid
isPermaLink="false">http://www.iphere.com/voip-planning-3-critical-steps</guid> <description><![CDATA[Don&#8217;t overlook these core considerations when implementing VoIP or you may find yourself in the middle of a disaster. Plan properly to ensure a successful deployment. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/voip-planning-3-critical-steps/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Microsoft patches critical flaws in Internet Explorer and Exchange Server</title><link>https://www.iphere.com/microsoft-patches-critical-flaws-in-internet-explorer-and-exchange-server</link> <comments>https://www.iphere.com/microsoft-patches-critical-flaws-in-internet-explorer-and-exchange-server#comments</comments> <pubDate>Wed, 14 Aug 2013 02:31:24 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Exchange]]></category> <category><![CDATA[Explorer]]></category> <category><![CDATA[flaws]]></category> <category><![CDATA[Internet]]></category> <category><![CDATA[Microsoft]]></category> <category><![CDATA[patches]]></category> <category><![CDATA[Server]]></category> <guid
isPermaLink="false">http://www.iphere.com/microsoft-patches-critical-flaws-in-internet-explorer-and-exchange-server</guid> <description><![CDATA[Is it already mid-August, and are we really up to the eighth Patch Tuesday of 2013? It’s time to start planning Halloween costumes and thinking about holiday shopping. Yikes! For the August Patch Tuesday, Microsoft has released eight new security bulletins. That’s not a light month by any stretch, but considering there have been many [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/microsoft-patches-critical-flaws-in-internet-explorer-and-exchange-server/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The Critical Need For Data Disposal</title><link>https://www.iphere.com/the-critical-need-for-data-disposal</link> <comments>https://www.iphere.com/the-critical-need-for-data-disposal#comments</comments> <pubDate>Mon, 03 Jun 2013 20:31:08 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Disposal]]></category> <category><![CDATA[Need]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-critical-need-for-data-disposal</guid> <description><![CDATA[With so much stored data having no business value, enterprises need to tackle the challenge of reducing the data mountain. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/the-critical-need-for-data-disposal/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Adobe patches critical flaws in Flash, Reader, and Acrobat</title><link>https://www.iphere.com/adobe-patches-critical-flaws-in-flash-reader-and-acrobat</link> <comments>https://www.iphere.com/adobe-patches-critical-flaws-in-flash-reader-and-acrobat#comments</comments> <pubDate>Sun, 13 Jan 2013 14:13:39 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Acrobat]]></category> <category><![CDATA[Adobe]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Flash]]></category> <category><![CDATA[flaws]]></category> <category><![CDATA[patches]]></category> <category><![CDATA[Reader]]></category> <guid
isPermaLink="false">http://www.iphere.com/adobe-patches-critical-flaws-in-flash-reader-and-acrobat</guid> <description><![CDATA[Today is the second Tuesday of January—which makes it the first Patch Tuesday of 2013. Adobe is addressing a few critical vulnerabilities in its software as well this Patch Tuesday. Adobe issued two Security Bulletins. The first, APSB13-01, is for Adobe Flash. The bulletin states that versions of Adobe Flash Player for Windows, Mac OS [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/adobe-patches-critical-flaws-in-flash-reader-and-acrobat/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Final Patch Tuesday of 2012 includes five &#8216;critical&#8217; updates</title><link>https://www.iphere.com/final-patch-tuesday-of-2012-includes-five-critical-updates</link> <comments>https://www.iphere.com/final-patch-tuesday-of-2012-includes-five-critical-updates#comments</comments> <pubDate>Wed, 12 Dec 2012 14:13:08 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[2012]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Final]]></category> <category><![CDATA[Five]]></category> <category><![CDATA[Includes]]></category> <category><![CDATA[Patch]]></category> <category><![CDATA[Tuesday]]></category> <category><![CDATA[Updates]]></category> <guid
isPermaLink="false">http://www.iphere.com/final-patch-tuesday-of-2012-includes-five-critical-updates</guid> <description><![CDATA[Today is the last Patch Tuesday of the year. There are seven new security bulletins from Microsoft this month, and five of them are rated &#8220;critical.&#8221; If you use Windows, Microsoft Office, or Internet Explorer, you’ve got some work to do to get these new patches applied. MS12-082 and MS12-083, security bulletins related to flaws [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/final-patch-tuesday-of-2012-includes-five-critical-updates/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Identity Management Becoming a Critical Issue for the Cloud as Well</title><link>https://www.iphere.com/identity-management-becoming-a-critical-issue-for-the-cloud-as-well</link> <comments>https://www.iphere.com/identity-management-becoming-a-critical-issue-for-the-cloud-as-well#comments</comments> <pubDate>Wed, 13 Jun 2012 08:13:05 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Becoming]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Identity]]></category> <category><![CDATA[Issue]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Well]]></category> <guid
isPermaLink="false">http://www.iphere.com/identity-management-becoming-a-critical-issue-for-the-cloud-as-well</guid> <description><![CDATA[Cloud services are being adopted by more and more business units&#8211;but who&#8217;s accessing what? New identity management tools are being released to help companies figure that out. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/identity-management-becoming-a-critical-issue-for-the-cloud-as-well/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>