<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Security</title> <atom:link href="https://www.iphere.com/tag/security/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Internet of Things security will be imperative as wearables, automobiles and more sign on</title><link>https://www.iphere.com/internet-of-things-security-will-be-imperative-as-wearables-automobiles-and-more-sign-on</link> <comments>https://www.iphere.com/internet-of-things-security-will-be-imperative-as-wearables-automobiles-and-more-sign-on#comments</comments> <pubDate>Sat, 08 Nov 2014 08:13:33 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[automobiles]]></category> <category><![CDATA[imperative]]></category> <category><![CDATA[Internet]]></category> <category><![CDATA[More]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[sign]]></category> <category><![CDATA[Things]]></category> <category><![CDATA[wearables]]></category> <guid
isPermaLink="false">http://www.iphere.com/internet-of-things-security-will-be-imperative-as-wearables-automobiles-and-more-sign-on</guid> <description><![CDATA[A mixture of excitement and danger. No, I’m not talking about a theme-park thrill ride, I’m talking about the future of technology as seen by users surveyed for Intel Security’s Safeguarding the Future of Digital America in 2025. Here’s a peek at some of the things people think will happen within the next decade: Two [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/internet-of-things-security-will-be-imperative-as-wearables-automobiles-and-more-sign-on/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Survey: BYOD security remains spotty, with users unaware or unmotivated about risks</title><link>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks</link> <comments>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks#comments</comments> <pubDate>Fri, 03 Oct 2014 08:12:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[About]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[remains]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[spotty]]></category> <category><![CDATA[Survey]]></category> <category><![CDATA[unaware]]></category> <category><![CDATA[unmotivated]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks</guid> <description><![CDATA[Many organizations have embraced the concept of BYOD (bring your own device), allowing employees to use their own personal smartphones and tablets at work. A new survey from BitDefender, however, suggests that BYOD policies and controls have a long way to go in order to be more secure. The BitDefender study, conducted by Millward Brown, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Virtual servers still face real security threats</title><link>https://www.iphere.com/virtual-servers-still-face-real-security-threats</link> <comments>https://www.iphere.com/virtual-servers-still-face-real-security-threats#comments</comments> <pubDate>Tue, 29 Jul 2014 08:14:29 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA['Real]]></category> <category><![CDATA[Face]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Servers]]></category> <category><![CDATA[Still]]></category> <category><![CDATA[Threats]]></category> <category><![CDATA[Virtual]]></category> <guid
isPermaLink="false">http://www.iphere.com/virtual-servers-still-face-real-security-threats</guid> <description><![CDATA[Don’t let the word “virtual” in virtual servers fool you. You’re the only one who knows it’s virtual. From the perspective of the virtual server itself, the devices connected to it, applications running on it, end-users connecting to it, or security threats trying to compromise it, the server is very, very real. A new survey [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/virtual-servers-still-face-real-security-threats/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Microsoft plans six security bulletins for July Patch Tuesday</title><link>https://www.iphere.com/microsoft-plans-six-security-bulletins-for-july-patch-tuesday</link> <comments>https://www.iphere.com/microsoft-plans-six-security-bulletins-for-july-patch-tuesday#comments</comments> <pubDate>Fri, 04 Jul 2014 08:13:19 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[bulletins]]></category> <category><![CDATA[July]]></category> <category><![CDATA[Microsoft]]></category> <category><![CDATA[Patch]]></category> <category><![CDATA[Plans]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Tuesday]]></category> <guid
isPermaLink="false">http://www.iphere.com/microsoft-plans-six-security-bulletins-for-july-patch-tuesday</guid> <description><![CDATA[As much of the workforce in the United States coasts through the rest of the day looking forward to an extended weekend to grill hot dogs and drink beer—I mean, celebrate the nation’s independence—Microsoft released its advance notification for next week’s Patch Tuesday. The six security bulletins include two ranked Critical, three Important, and one [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/microsoft-plans-six-security-bulletins-for-july-patch-tuesday/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Study: 7 in 10 concerned about security of Internet-of-Things</title><link>https://www.iphere.com/study-7-in-10-concerned-about-security-of-internet-of-things</link> <comments>https://www.iphere.com/study-7-in-10-concerned-about-security-of-internet-of-things#comments</comments> <pubDate>Mon, 23 Jun 2014 20:15:40 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[About]]></category> <category><![CDATA[concerned]]></category> <category><![CDATA[InternetofThings]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Study]]></category> <guid
isPermaLink="false">http://www.iphere.com/study-7-in-10-concerned-about-security-of-internet-of-things</guid> <description><![CDATA[The Internet-of-Things is a thing. If you haven’t heard about it yet, get ready because we’re in the early stages of an explosion of technology that will connect, monitor, and in some cases share almost every aspect of our lives. Fortinet conducted a survey of consumers to find out what people think about the security [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/study-7-in-10-concerned-about-security-of-internet-of-things/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Microsoft pushes out massive security update for Internet Explorer</title><link>https://www.iphere.com/microsoft-pushes-out-massive-security-update-for-internet-explorer</link> <comments>https://www.iphere.com/microsoft-pushes-out-massive-security-update-for-internet-explorer#comments</comments> <pubDate>Tue, 10 Jun 2014 20:14:43 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Explorer]]></category> <category><![CDATA[Internet]]></category> <category><![CDATA[Massive]]></category> <category><![CDATA[Microsoft]]></category> <category><![CDATA[Pushes]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Update]]></category> <guid
isPermaLink="false">http://www.iphere.com/microsoft-pushes-out-massive-security-update-for-internet-explorer</guid> <description><![CDATA[Six down, six to go. Today is the Microsoft Patch Tuesday for June, and it comes with seven new security bulletins. The good news is that five of the seven are only rated as Important, but one of the two Critical security bulletins—the cumulative update for Internet Explorer—is huge. In all, the seven security bulletins [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/microsoft-pushes-out-massive-security-update-for-internet-explorer/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Networking, Security, And Grand Unified Theory</title><link>https://www.iphere.com/networking-security-and-grand-unified-theory</link> <comments>https://www.iphere.com/networking-security-and-grand-unified-theory#comments</comments> <pubDate>Fri, 11 Apr 2014 20:12:59 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Grand]]></category> <category><![CDATA[networking]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Theory]]></category> <category><![CDATA[Unified]]></category> <guid
isPermaLink="false">http://www.iphere.com/networking-security-and-grand-unified-theory</guid> <description><![CDATA[With a system that can address both networking and security in NSX, Martin Casado of VMware is borrowing an idea from the world of physics. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/networking-security-and-grand-unified-theory/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building An Information Security Policy Part 3: Logical And Physical Design</title><link>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design#comments</comments> <pubDate>Thu, 20 Mar 2014 02:19:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Design]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Logical]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Physical]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design</guid> <description><![CDATA[Careful crafting of the logical and physical aspects of a network is essential for an effective security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-3-logical-and-physical-design/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Today&#8217;s Network Security Challenges: No Easy Answers</title><link>https://www.iphere.com/todays-network-security-challenges-no-easy-answers</link> <comments>https://www.iphere.com/todays-network-security-challenges-no-easy-answers#comments</comments> <pubDate>Sat, 01 Mar 2014 02:13:35 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Answers]]></category> <category><![CDATA[Challenges]]></category> <category><![CDATA[Easy]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Today's]]></category> <guid
isPermaLink="false">http://www.iphere.com/todays-network-security-challenges-no-easy-answers</guid> <description><![CDATA[The BYOD trend and proliferation of mobile devices are making life hard for security teams, but solutions are elusive, panelists say at RSA Conference 2014 Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/todays-network-security-challenges-no-easy-answers/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Building An Information Security Policy Part 2: Hardware and Software</title><link>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</link> <comments>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software#comments</comments> <pubDate>Fri, 28 Feb 2014 02:14:33 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Building]]></category> <category><![CDATA[Hardware]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Policy]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Software]]></category> <guid
isPermaLink="false">http://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software</guid> <description><![CDATA[Here&#8217;s how to select the right network device hardware and software to support your security policy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/building-an-information-security-policy-part-2-hardware-and-software/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>