<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments for Identia Security	</title>
	<atom:link href="https://identia.ai/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://identia.ai</link>
	<description></description>
	<lastBuildDate>Tue, 03 Sep 2024 04:57:14 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>
	<item>
		<title>
		Comment on What You Shouldn’t Be Doing with Your Cybersecurity in 2023 by Rebecca Moor		</title>
		<link>https://identia.ai/what-you-shouldnt-be-doing-with-your-cybersecurity-in-2023/#comment-12</link>

		<dc:creator><![CDATA[Rebecca Moor]]></dc:creator>
		<pubDate>Tue, 11 Apr 2023 07:03:01 +0000</pubDate>
		<guid isPermaLink="false">https://tecnologia.vamtam.com/?p=8426#comment-12</guid>

					<description><![CDATA[Companies often neglect to have written standards and policies around their cybersecurity. Why? Because dozens of them are usually needed, covering everything from equipment management to backup procedures, admin credentialing, remote work policies, and so much more. But it’s well worth the effort.]]></description>
			<content:encoded><![CDATA[<p>Companies often neglect to have written standards and policies around their cybersecurity. Why? Because dozens of them are usually needed, covering everything from equipment management to backup procedures, admin credentialing, remote work policies, and so much more. But it’s well worth the effort.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Top 5 Tips for Solving the Email Security Problem by Rebecca Moor		</title>
		<link>https://identia.ai/top-5-tips-for-solving-the-email-security-problem/#comment-13</link>

		<dc:creator><![CDATA[Rebecca Moor]]></dc:creator>
		<pubDate>Tue, 11 Apr 2023 07:01:22 +0000</pubDate>
		<guid isPermaLink="false">https://tecnologia.vamtam.com/?p=8429#comment-13</guid>

					<description><![CDATA[Not only will a network administrator keep you safe, but you will not have to waste as much time going through unwanted emails. Protect yourself before the inevitable happens.]]></description>
			<content:encoded><![CDATA[<p>Not only will a network administrator keep you safe, but you will not have to waste as much time going through unwanted emails. Protect yourself before the inevitable happens.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on 4 Cybersecurity Takeaways from China’s Largest Data Breach by Rebecca Moor		</title>
		<link>https://identia.ai/4-cybersecurity-takeaways-from-chinas-largest-data-breach/#comment-14</link>

		<dc:creator><![CDATA[Rebecca Moor]]></dc:creator>
		<pubDate>Tue, 11 Apr 2023 06:59:01 +0000</pubDate>
		<guid isPermaLink="false">https://tecnologia.vamtam.com/?p=8432#comment-14</guid>

					<description><![CDATA[We didn’t invent the term “fools with tools.” Still, it’s a perfect definition for the practice of buying a stack of sophisticated cybersecurity technology that’s impossible to manage without an MSP or the budget of a Fortune 500 IT department.]]></description>
			<content:encoded><![CDATA[<p>We didn’t invent the term “fools with tools.” Still, it’s a perfect definition for the practice of buying a stack of sophisticated cybersecurity technology that’s impossible to manage without an MSP or the budget of a Fortune 500 IT department.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on How startups are cutting cloud costs, renegotiating deals with service providers by Rebecca Moor		</title>
		<link>https://identia.ai/how-startups-are-cutting-cloud-costs-renegotiating-deals-with-service-providers/#comment-15</link>

		<dc:creator><![CDATA[Rebecca Moor]]></dc:creator>
		<pubDate>Mon, 10 Apr 2023 11:22:57 +0000</pubDate>
		<guid isPermaLink="false">https://tecnologia.vamtam.com/?p=8435#comment-15</guid>

					<description><![CDATA[Even if we do not talk about 5G (specifically), the security talent in general in the country is very sparse at the moment. We need to get more (security) professionals in the system.]]></description>
			<content:encoded><![CDATA[<p>Even if we do not talk about 5G (specifically), the security talent in general in the country is very sparse at the moment. We need to get more (security) professionals in the system.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
