<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Secure</title> <atom:link href="https://www.iphere.com/tag/secure/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Secure Networks: How To Develop An Information Security Policy</title><link>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy</link> <comments>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy#comments</comments> <pubDate>Thu, 23 Jan 2014 20:13:23 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Develop]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy</guid> <description><![CDATA[A security policy is the foundation of a secure network, but it must balance security with business needs. Here are some guidelines for successful security policy development. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/secure-networks-how-to-develop-an-information-security-policy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Cloud Security Alliance Launches Secure Network Effort</title><link>https://www.iphere.com/cloud-security-alliance-launches-secure-network-effort</link> <comments>https://www.iphere.com/cloud-security-alliance-launches-secure-network-effort#comments</comments> <pubDate>Fri, 22 Nov 2013 02:14:54 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Alliance]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Effort]]></category> <category><![CDATA[Launches]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/cloud-security-alliance-launches-secure-network-effort</guid> <description><![CDATA[Software-Defined Perimeter project aims to develop a framework that provides secure connectivity from any device to cloud applications. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/cloud-security-alliance-launches-secure-network-effort/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Book Review: &#8216;Cisco ISE For BYOD And Secure Unified Access&#8217;</title><link>https://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access</link> <comments>https://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access#comments</comments> <pubDate>Wed, 20 Nov 2013 08:12:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Access]]></category> <category><![CDATA[Book]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Review]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Unified]]></category> <guid
isPermaLink="false">http://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access</guid> <description><![CDATA[For a network engineer planning a Cisco Identity Services Engine deployment, this publication provides valuable technical guidance and practical troubleshooting advice. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Take steps to secure what little online privacy you still have</title><link>https://www.iphere.com/take-steps-to-secure-what-little-online-privacy-you-still-have</link> <comments>https://www.iphere.com/take-steps-to-secure-what-little-online-privacy-you-still-have#comments</comments> <pubDate>Thu, 25 Apr 2013 02:12:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Little]]></category> <category><![CDATA[Online]]></category> <category><![CDATA[Privacy]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Steps]]></category> <category><![CDATA[Still]]></category> <category><![CDATA[Take]]></category> <guid
isPermaLink="false">http://www.iphere.com/take-steps-to-secure-what-little-online-privacy-you-still-have</guid> <description><![CDATA[Before you can take steps to protect your privacy, you need to define just what the word means. And the second task can be more difficult given the spread of social-networking tools and Big Brother legislation such as CISPA. Microsoft&#8217;s recently launched privacy-awareness campaign includes a survey ostensibly designed to help consumers determine their &#8220;privacy type,&#8221; based [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/take-steps-to-secure-what-little-online-privacy-you-still-have/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>How To Secure WLANs: A Visual Overview</title><link>https://www.iphere.com/how-to-secure-wlans-a-visual-overview</link> <comments>https://www.iphere.com/how-to-secure-wlans-a-visual-overview#comments</comments> <pubDate>Wed, 27 Mar 2013 08:15:11 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Overview]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Visual]]></category> <category><![CDATA[WLANs]]></category> <guid
isPermaLink="false">http://www.iphere.com/how-to-secure-wlans-a-visual-overview</guid> <description><![CDATA[Secure wireless networks don&#8217;t just happen&#8211;users and IT pros have to make it happen. But what goes into making a wireless network secure? Here&#8217;s a look some essential steps for locking down wireless communications, including advice for road warriors, small business owners and WLAN administrators running large networks. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/how-to-secure-wlans-a-visual-overview/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Voting Machines Should Be As Secure As Slot Machines</title><link>https://www.iphere.com/voting-machines-should-be-as-secure-as-slot-machines</link> <comments>https://www.iphere.com/voting-machines-should-be-as-secure-as-slot-machines#comments</comments> <pubDate>Wed, 07 Nov 2012 08:13:49 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Machines]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Should]]></category> <category><![CDATA[Slot]]></category> <category><![CDATA[Voting]]></category> <guid
isPermaLink="false">http://www.iphere.com/voting-machines-should-be-as-secure-as-slot-machines</guid> <description><![CDATA[Casino gaming machines undergo independent scrutiny to certify their reliability. Shouldn&#8217;t voting machines get the same treatment? Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/voting-machines-should-be-as-secure-as-slot-machines/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Public Cloud Is Neither More Nor Less Secure Than Private Cloud</title><link>https://www.iphere.com/public-cloud-is-neither-more-nor-less-secure-than-private-cloud</link> <comments>https://www.iphere.com/public-cloud-is-neither-more-nor-less-secure-than-private-cloud#comments</comments> <pubDate>Tue, 26 Jun 2012 20:13:18 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Less]]></category> <category><![CDATA[More]]></category> <category><![CDATA[Neither]]></category> <category><![CDATA[Private]]></category> <category><![CDATA[Public]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Than]]></category> <guid
isPermaLink="false">http://www.iphere.com/public-cloud-is-neither-more-nor-less-secure-than-private-cloud</guid> <description><![CDATA[Claims that public cloud is more secure than private cloud are pure FUD and ignore the responsibilities that each party plays in information security. What matters is how well your applications and VM are protected. Learn why. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/public-cloud-is-neither-more-nor-less-secure-than-private-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>5 Secure Switch Management Best Practices</title><link>https://www.iphere.com/5-secure-switch-management-best-practices</link> <comments>https://www.iphere.com/5-secure-switch-management-best-practices#comments</comments> <pubDate>Thu, 29 Mar 2012 14:12:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Best]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Practices]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Switch]]></category> <guid
isPermaLink="false">http://www.iphere.com/5-secure-switch-management-best-practices</guid> <description><![CDATA[One of the easiest things an organization can do to help increase the security posture of their infrastructure is to implement a policy and standard for secure management. Often overlooked, or not fully executed, this is what I consider to be the low hanging fruit of network security. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/5-secure-switch-management-best-practices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Searching for a More Secure Internet</title><link>https://www.iphere.com/searching-for-a-more-secure-internet</link> <comments>https://www.iphere.com/searching-for-a-more-secure-internet#comments</comments> <pubDate>Sun, 18 Mar 2012 02:16:17 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Internet]]></category> <category><![CDATA[More]]></category> <category><![CDATA[Searching]]></category> <category><![CDATA[Secure]]></category> <guid
isPermaLink="false">http://www.iphere.com/searching-for-a-more-secure-internet</guid> <description><![CDATA[Have you heard of TIM? The Trustworthy Internet Movement is a new initiative launched a few weeks ago at the 2012 RSA Security Conference. The goal of TIM is to bring together experts, industry stakeholders, and others in an effort to build a safer and more secure Internet. TIM was founded by Philippe Courtot, chairman [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/searching-for-a-more-secure-internet/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Encryption, Data-Centric Approach Needed To Secure Cloud, Mobile Users</title><link>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</link> <comments>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users#comments</comments> <pubDate>Wed, 08 Feb 2012 20:13:59 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[DataCentric]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Needed]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</guid> <description><![CDATA[The ever-growing mobile workforce with its head in the cloud has created what seems like an endless list of IT challenges to overcome, and with anywhere, anytime access to information a necessity for many enterprises, the new IT world is having an impact on the kind of encryption enterprises need to protect their sensitive and [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>