<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Information</title> <atom:link href="https://www.iphere.com/tag/information/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Building An Information Security Policy Part 3: Logical And Physical Design</title><link>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design#comments</comments> <pubDate>Thu, 20 Mar 2014 02:19:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Design]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Logical]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Physical]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</guid> <description><![CDATA[Careful crafting of the logical and physical aspects of a network is essential for an effective security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building An Information Security Policy Part 2: Hardware and Software</title><link>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software#comments</comments> <pubDate>Fri, 28 Feb 2014 02:14:33 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Hardware]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Software]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</guid> <description><![CDATA[Here&#8217;s how to select the right network device hardware and software to support your security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building an Information Security Policy Part 1: Network Devices</title><link>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices#comments</comments> <pubDate>Wed, 19 Feb 2014 20:13:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Devices]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-1-network-devices</guid> <description><![CDATA[An effective security policy requires careful planning to ensure the roles and capabilities of routers, switches and firewalls are properly configured. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-1-network-devices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Secure Networks: How To Develop An Information Security Policy</title><link>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy</link> <comments>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy#comments</comments> <pubDate>Thu, 23 Jan 2014 20:13:23 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Develop]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy</guid> <description><![CDATA[A security policy is the foundation of a secure network, but it must balance security with business needs. Here are some guidelines for successful security policy development. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Want To Develop Information Security Skills? Capture The Flag</title><link>https://www.iphere.com/want-to-develop-information-security-skills-capture-the-flag</link> <comments>https://www.iphere.com/want-to-develop-information-security-skills-capture-the-flag#comments</comments> <pubDate>Thu, 09 Jan 2014 20:14:52 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[capture]]></category> <category><![CDATA[Develop]]></category> <category><![CDATA[Flag]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Skills]]></category> <category><![CDATA[Want]]></category> <guid
isPermaLink="false">http://www.iphere.com/want-to-develop-information-security-skills-capture-the-flag</guid> <description><![CDATA[The popular competition among information security enthusiasts has evolved into a mainstream endeavor critical for professional development. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/want-to-develop-information-security-skills-capture-the-flag/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>6 Information Security New Year&#8217;s Resolutions</title><link>https://www.iphere.com/6-information-security-new-years-resolutions</link> <comments>https://www.iphere.com/6-information-security-new-years-resolutions#comments</comments> <pubDate>Tue, 31 Dec 2013 02:12:47 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Resolutions]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Years]]></category> <guid
isPermaLink="false">http://www.iphere.com/6-information-security-new-years-resolutions</guid> <description><![CDATA[2013 was another rough year for information security pros. Let&#8217;s resolve to make some changes to improve security in 2014, starting with increased data encryption. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/6-information-security-new-years-resolutions/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>How E-discovery Tools Can Help With Information Governance</title><link>https://www.iphere.com/how-e-discovery-tools-can-help-with-information-governance</link> <comments>https://www.iphere.com/how-e-discovery-tools-can-help-with-information-governance#comments</comments> <pubDate>Mon, 23 Dec 2013 20:12:48 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[EDiscovery]]></category> <category><![CDATA[Governance]]></category> <category><![CDATA[Help]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Tools]]></category> <guid
isPermaLink="false">http://www.iphere.com/how-e-discovery-tools-can-help-with-information-governance</guid> <description><![CDATA[Common e-discovery technologies can help an organization enforce information governance policies. Here are three scenarios. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/how-e-discovery-tools-can-help-with-information-governance/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Do NIST Information Security Standards Matter?</title><link>https://www.iphere.com/do-nist-information-security-standards-matter</link> <comments>https://www.iphere.com/do-nist-information-security-standards-matter#comments</comments> <pubDate>Wed, 30 Oct 2013 08:15:50 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Matter]]></category> <category><![CDATA[NIST]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Standards]]></category> <guid
isPermaLink="false">http://www.iphere.com/do-nist-information-security-standards-matter</guid> <description><![CDATA[The information security field is awash in regulations and requirements, but National Institute of Standards and Technology standards provide a strong foundation for an information security program. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/do-nist-information-security-standards-matter/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Information Security Strategy: Stop Punishing End Users</title><link>https://www.iphere.com/information-security-strategy-stop-punishing-end-users</link> <comments>https://www.iphere.com/information-security-strategy-stop-punishing-end-users#comments</comments> <pubDate>Wed, 02 Oct 2013 08:13:34 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Punishing]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[Strategy]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/information-security-strategy-stop-punishing-end-users</guid> <description><![CDATA[Enterprise security programs have longed focused on restricting end-user activity, but this strategy hasn&#8217;t worked. It&#8217;s time to change course. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/information-security-strategy-stop-punishing-end-users/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Tackling Information Infrastructure Complexity</title><link>https://www.iphere.com/tackling-information-infrastructure-complexity</link> <comments>https://www.iphere.com/tackling-information-infrastructure-complexity#comments</comments> <pubDate>Sat, 03 Aug 2013 02:12:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Complexity]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Infrastructure]]></category> <category><![CDATA[Tackling]]></category> <guid
isPermaLink="false">http://www.iphere.com/tackling-information-infrastructure-complexity</guid> <description><![CDATA[Taking a software and data-driven approach can help reduce costs and maintain availability as IT become more complex. Here&#8217;s a look at Sanbolic, one of the companies in this emerging area. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/tackling-information-infrastructure-complexity/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>