<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Risks</title> <atom:link href="https://www.iphere.com/tag/risks/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Survey: BYOD security remains spotty, with users unaware or unmotivated about risks</title><link>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks</link> <comments>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks#comments</comments> <pubDate>Fri, 03 Oct 2014 08:12:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[About]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[remains]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[spotty]]></category> <category><![CDATA[Survey]]></category> <category><![CDATA[unaware]]></category> <category><![CDATA[unmotivated]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks</guid> <description><![CDATA[Many organizations have embraced the concept of BYOD (bring your own device), allowing employees to use their own personal smartphones and tablets at work. A new survey from BitDefender, however, suggests that BYOD policies and controls have a long way to go in order to be more secure. The BitDefender study, conducted by Millward Brown, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Beware SDN Security Risks, Experts Warn</title><link>https://www.iphere.com/beware-sdn-security-risks-experts-warn</link> <comments>https://www.iphere.com/beware-sdn-security-risks-experts-warn#comments</comments> <pubDate>Wed, 12 Feb 2014 20:13:35 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Beware]]></category> <category><![CDATA[Experts]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Warn]]></category> <guid
isPermaLink="false">http://www.iphere.com/beware-sdn-security-risks-experts-warn</guid> <description><![CDATA[Software-defined networking is taking the industry by storm, but presents new security challenges, according to security specialists. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/beware-sdn-security-risks-experts-warn/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>SDN Management: Risks And Challenges</title><link>https://www.iphere.com/sdn-management-risks-and-challenges</link> <comments>https://www.iphere.com/sdn-management-risks-and-challenges#comments</comments> <pubDate>Fri, 07 Feb 2014 02:13:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Challenges]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Risks]]></category> <guid
isPermaLink="false">http://www.iphere.com/sdn-management-risks-and-challenges</guid> <description><![CDATA[Traditional network management techniques don&#8217;t work with software-defined networking. Automation of management best practices is critical for SDN to succeed. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/sdn-management-risks-and-challenges/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Endpoint Security Risks On The Rise, But Budgets Flat, Report Says</title><link>https://www.iphere.com/endpoint-security-risks-on-the-rise-but-budgets-flat-report-says</link> <comments>https://www.iphere.com/endpoint-security-risks-on-the-rise-but-budgets-flat-report-says#comments</comments> <pubDate>Fri, 10 Jan 2014 02:13:56 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Budgets]]></category> <category><![CDATA[Endpoint]]></category> <category><![CDATA[Flat]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Rise]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Says]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/endpoint-security-risks-on-the-rise-but-budgets-flat-report-says</guid> <description><![CDATA[Survey shows that IT security pros are more worried about endpoint security threats, but organizations aren&#8217;t allocating more resources to combat them. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/endpoint-security-risks-on-the-rise-but-budgets-flat-report-says/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Government Shutdown: What Are IT Systems Risks?</title><link>https://www.iphere.com/government-shutdown-what-are-it-systems-risks</link> <comments>https://www.iphere.com/government-shutdown-what-are-it-systems-risks#comments</comments> <pubDate>Wed, 02 Oct 2013 14:16:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Government]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Shutdown]]></category> <category><![CDATA[Systems]]></category> <guid
isPermaLink="false">http://www.iphere.com/government-shutdown-what-are-it-systems-risks</guid> <description><![CDATA[As federal agencies brace for a government shutdown, deciding which IT staffers will be needed to maintain essential operations and who will be furloughed has proven much harder to resolve than when the government shutdown last time 17 years ago. With the House unable to deliver a spending resolution on Sunday that would win acceptance [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/government-shutdown-what-are-it-systems-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The Insidious Security Risks Of Thumb Drives and Paper Files</title><link>https://www.iphere.com/the-insidious-security-risks-of-thumb-drives-and-paper-files</link> <comments>https://www.iphere.com/the-insidious-security-risks-of-thumb-drives-and-paper-files#comments</comments> <pubDate>Sat, 01 Jun 2013 02:13:34 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Drives]]></category> <category><![CDATA[Files]]></category> <category><![CDATA[Insidious]]></category> <category><![CDATA[Paper]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Thumb]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-insidious-security-risks-of-thumb-drives-and-paper-files</guid> <description><![CDATA[Numerous surveys show that IT managers are worried about BYOD security but lost flash drives and manila folders remain the bigger threats. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/the-insidious-security-risks-of-thumb-drives-and-paper-files/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Rise Of HTML5 Brings With It Security Risks</title><link>https://www.iphere.com/rise-of-html5-brings-with-it-security-risks</link> <comments>https://www.iphere.com/rise-of-html5-brings-with-it-security-risks#comments</comments> <pubDate>Wed, 25 Jan 2012 08:16:19 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Brings]]></category> <category><![CDATA[HTML5]]></category> <category><![CDATA[Rise]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/rise-of-html5-brings-with-it-security-risks</guid> <description><![CDATA[HTML5 is the new &#8220;it&#8221; protocol on the Internet. Among other things, it is an alternative to Adobe&#8217;s Flash for displaying content through a Web browser. No less an industry authority than the late Steve Jobs declared in 2010 that browsers on Apple devices such as the iPad would support HTML5 and not Flash. But [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/rise-of-html5-brings-with-it-security-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Port 80 Report Highlights Network Risks</title><link>https://www.iphere.com/port-80-report-highlights-network-risks</link> <comments>https://www.iphere.com/port-80-report-highlights-network-risks#comments</comments> <pubDate>Wed, 18 Jan 2012 20:19:54 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Highlights]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Port]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Risks]]></category> <guid
isPermaLink="false">http://www.iphere.com/port-80-report-highlights-network-risks</guid> <description><![CDATA[If IT security professionals think that by securing Port 80 on their network &#8212; the firewall port through which Web traffic passes &#8212; that they are protected from Web application-related threats, they need to think again, according to a new report from a network security provider. The latest &#8220;Applications Usage and Risk Report&#8221; from Palo [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/port-80-report-highlights-network-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Zettaset Analyzes Petabytes Of Data To ID Security Risks</title><link>https://www.iphere.com/zettaset-analyzes-petabytes-of-data-to-id-security-risks</link> <comments>https://www.iphere.com/zettaset-analyzes-petabytes-of-data-to-id-security-risks#comments</comments> <pubDate>Fri, 12 Aug 2011 02:16:48 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Analyzes]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Petabytes]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Zettaset]]></category> <guid
isPermaLink="false">http://www.iphere.com/zettaset-analyzes-petabytes-of-data-to-id-security-risks</guid> <description><![CDATA[A security firm has introduced a security data warehouse stack that analyzes reams of data on a network to identify and intervene to thwart security threats. Zettaset&#8217;s software, based on the open source Hadoop software framework, mines security information from network firewalls, security devices, website traffic, business processes and other transactions. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/zettaset-analyzes-petabytes-of-data-to-id-security-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Enterprise Social Networks And Security Risks</title><link>https://www.iphere.com/enterprise-social-networks-and-security-risks</link> <comments>https://www.iphere.com/enterprise-social-networks-and-security-risks#comments</comments> <pubDate>Thu, 30 Jun 2011 08:23:56 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Social]]></category> <guid
isPermaLink="false">http://www.iphere.com/enterprise-social-networks-and-security-risks</guid> <description><![CDATA[While attending UBM TechWeb&#8217;s Enterprise 2.0 Conference in Boston last week, I heard lots of conversations about the benefits and potential pitfalls of enterprise social networking. One theme that I heard repeated more than a few times was that enterprise social networks can create a greater security risk. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/enterprise-social-networks-and-security-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>