<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Stop</title> <atom:link href="https://www.iphere.com/tag/stop/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Information Security Strategy: Stop Punishing End Users</title><link>https://www.iphere.com/information-security-strategy-stop-punishing-end-users</link> <comments>https://www.iphere.com/information-security-strategy-stop-punishing-end-users#comments</comments> <pubDate>Wed, 02 Oct 2013 08:13:34 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Information]]></category> <category><![CDATA[Punishing]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[Strategy]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/information-security-strategy-stop-punishing-end-users</guid> <description><![CDATA[Enterprise security programs have longed focused on restricting end-user activity, but this strategy hasn&#8217;t worked. It&#8217;s time to change course. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/information-security-strategy-stop-punishing-end-users/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>To Break The IT Bottleneck, Stop Covering Your You-Know-What</title><link>https://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what</link> <comments>https://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what#comments</comments> <pubDate>Thu, 11 Jul 2013 14:13:39 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Bottleneck]]></category> <category><![CDATA[Break]]></category> <category><![CDATA[Covering]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[YouKnowWhat]]></category> <guid
isPermaLink="false">http://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what</guid> <description><![CDATA[Fifteen signatures. That&#8217;s how many approvals were required to make a single change on a production firewall at the global transportation company where I was a technical architect. Fifteen separate approvals, all captured on paper and ultimately dropped into a file cabinet somewhere, likely never to be seen again. The process was long, painful and, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/to-break-the-it-bottleneck-stop-covering-your-you-know-what/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Using Human Behavioral Analysis to Stop DDOS at Layer 7</title><link>https://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7</link> <comments>https://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7#comments</comments> <pubDate>Thu, 13 Sep 2012 08:13:46 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Analysis]]></category> <category><![CDATA[Behavioral]]></category> <category><![CDATA[DDoS]]></category> <category><![CDATA[Human]]></category> <category><![CDATA[Layer]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7</guid> <description><![CDATA[Black Lotus rolls out a patented-pending technique that it says moves beyond basic network heuristics to protect against distributed denial-of-service attacks. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The IT Law of Holes: Stop Digging and Start the Technology Migration</title><link>https://www.iphere.com/the-it-law-of-holes-stop-digging-and-start-the-technology-migration</link> <comments>https://www.iphere.com/the-it-law-of-holes-stop-digging-and-start-the-technology-migration#comments</comments> <pubDate>Mon, 21 May 2012 14:14:23 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Digging]]></category> <category><![CDATA[Holes]]></category> <category><![CDATA[Migration]]></category> <category><![CDATA[Start]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[Technology]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-it-law-of-holes-stop-digging-and-start-the-technology-migration</guid> <description><![CDATA[Eventually, you&#8217;ll need to retire the legacy systems and make that technology migration. Embrace the Law of Holes and learn how to set your cap-and-grow strategy. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/the-it-law-of-holes-stop-digging-and-start-the-technology-migration/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Sourcefire Uses Big Data Analytics To Stop Malware</title><link>https://www.iphere.com/sourcefire-uses-big-data-analytics-to-stop-malware</link> <comments>https://www.iphere.com/sourcefire-uses-big-data-analytics-to-stop-malware#comments</comments> <pubDate>Thu, 26 Jan 2012 02:15:00 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Analytics']]></category> <category><![CDATA[data]]></category> <category><![CDATA[Malware]]></category> <category><![CDATA[Sourcefire]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[Uses]]></category> <guid
isPermaLink="false">http://www.iphere.com/sourcefire-uses-big-data-analytics-to-stop-malware</guid> <description><![CDATA[Cyber security vendor Sourcefire&#8217;s latest product uses big data analytics methods to search data to discover patterns in malware attacks and intervene to stop them. The release of FireAMP comes the same week that Cisco Systems released its 4Q11 Global Threat Report that details how pervasive the malware threat is to networks. Cisco reports that [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/sourcefire-uses-big-data-analytics-to-stop-malware/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Stop SOPA! A Plea from the Inventors of the Internet</title><link>https://www.iphere.com/stop-sopa-a-plea-from-the-inventors-of-the-internet</link> <comments>https://www.iphere.com/stop-sopa-a-plea-from-the-inventors-of-the-internet#comments</comments> <pubDate>Sat, 24 Dec 2011 08:16:53 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[from]]></category> <category><![CDATA[Internet]]></category> <category><![CDATA[Inventors]]></category> <category><![CDATA[Plea]]></category> <category><![CDATA[SOPA]]></category> <category><![CDATA[Stop]]></category> <guid
isPermaLink="false">http://www.iphere.com/stop-sopa-a-plea-from-the-inventors-of-the-internet</guid> <description><![CDATA[What happens when you combine an overzealous drive to fight Internet piracy, with elected representatives who don’t know the difference between DNS, IM, and MP3? You get SOPA&#8211;draconian legislation that far exceeds its intended scope, and threatens the Constitutional rights of law abiding citizens. And it may just pass. An open letter to Congress written [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/stop-sopa-a-plea-from-the-inventors-of-the-internet/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>How to Stop Telemarketing Calls to Your Mobile Phone</title><link>https://www.iphere.com/how-to-stop-telemarketing-calls-to-your-mobile-phone</link> <comments>https://www.iphere.com/how-to-stop-telemarketing-calls-to-your-mobile-phone#comments</comments> <pubDate>Sat, 12 Nov 2011 20:12:43 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Calls]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Phone]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[Telemarketing]]></category> <guid
isPermaLink="false">http://www.iphere.com/how-to-stop-telemarketing-calls-to-your-mobile-phone</guid> <description><![CDATA[Everyone has encountered a telemarketing call. It may be a robocall directing you to vote for some political candidate, or perhaps some local organization seeking donations. But, most people are used to getting those calls on their home land line, not their mobile phones. Telemarketers are increasingly targeting mobile phone numbers, though, so here is [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/how-to-stop-telemarketing-calls-to-your-mobile-phone/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>