<?xml version="1.0"?>
<rss version="2.0" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:yt="http://gdata.youtube.com/schemas/2007" xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
      <title>IT Security - The IT Security Industry's Web Resource</title>
      <description>Pipes Output</description>
      <link>http://pipes.yahoo.com/pipes/pipe.info?_id=2F4ZN0Pp2xGf4rIcJphxuA</link>
      <atom:link rel="next" href="http://pipes.yahoo.com/pipes/pipe.run?_id=2F4ZN0Pp2xGf4rIcJphxuA&amp;_render=rss&amp;page=2"/>
      <pubDate>Thu, 01 Oct 2015 23:10:15 +0000</pubDate>
      <generator>http://pipes.yahoo.com/pipes/</generator>
      <item>
         <title>Boost Performance &amp; Efficiency with Your Data Center Infrastructure</title>
         <link>http://www.itsecurity.com/events/data-center-infrastructure/</link>
         <description>On-Demand Webinar &amp;gt; &amp;nbsp; Watch Now!&amp;gt;&amp;gt;SPONSORED   BY: Juniper NetworksWatch this FREE on-demand webinar to learn how you and your company can get started down the road to reach the pinnacle ...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/data-center-infrastructure/</guid>
         <pubDate>Wed, 07 Jul 2010 19:54:12 +0000</pubDate>
      </item>
      <item>
         <title>5 Reasons Why SMBs Can Now Adopt Virtualization</title>
         <link>http://www.itsecurity.com/events/vm6-61610/</link>
         <description>On-Demand Webinar &amp;gt;&amp;nbsp; Watch  Now!&amp;gt;&amp;gt;&amp;nbsp;SPONSORED   BY: VM6 SoftwareWatch this FREE on-demand webinar now and you&amp;rsquo;ll discover:Why virtualization is important How to achieve a scala...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/vm6-61610/</guid>
         <pubDate>Fri, 11 Jun 2010 23:57:01 +0000</pubDate>
      </item>
      <item>
         <title>Information Security: Harnessing the Overlooked Source for SMB Competitive Advantage</title>
         <link>http://www.itsecurity.com/events/information-security-smb/</link>
         <description>On-Demand Webinar &amp;gt;&amp;nbsp; Watch Now!&amp;gt;&amp;gt;SPONSORED  BY: AT&amp;amp;TWatch this FREE on-demand webinar to learn how to make the connections between information security and competitive success for yo...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/information-security-smb/</guid>
         <pubDate>Wed, 09 Jun 2010 19:43:36 +0000</pubDate>
      </item>
      <item>
         <title>Spoofing Server to Server Communication: How You Can Prevent It</title>
         <link>http://www.itsecurity.com/events/server-to-server-communication-its/</link>
         <description>On-Demand Webinar &amp;gt;&amp;nbsp; Watch Now!&amp;gt;&amp;gt;SPONSORED BY: VeriSignWatch this FREE on-demand webinar to hear from Michael E. Dortch, Focus Research Director, and Security Analyst, Larry Seltzer, as ...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/server-to-server-communication-its/</guid>
         <pubDate>Wed, 12 May 2010 20:54:52 +0000</pubDate>
      </item>
      <item>
         <title>Maximize Your IT Infrastructure; Maximize Business Productivity</title>
         <link>http://www.itsecurity.com/events/maximize-it-infrastructure/</link>
         <description>On-Demand Webinar &amp;gt;Watch Now!&amp;gt;&amp;gt;SPONSORED BY: Qwest Business Solutions&amp;reg;Watch this FREE on-demand 30-minute webcast to hear Qwest Communications CIO, Girish Varma, Qwest&amp;rsquo;s Director of...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/maximize-it-infrastructure/</guid>
         <pubDate>Fri, 26 Mar 2010 23:29:07 +0000</pubDate>
      </item>
      <item>
         <title>Zero Day Response: Strategies for the Newest Innovation in Corporate Defense</title>
         <link>http://www.itsecurity.com/events/zero-day-response/</link>
         <description>On-Demand Webinar &amp;gt; Watch Now!&amp;gt;&amp;gt;SPONSORED BY: TripwireResearch shows that over a third of organizations are not prepared for breaches while the average cost per breach in 2009 was $6.7 millio...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/zero-day-response/</guid>
         <pubDate>Fri, 26 Mar 2010 23:04:02 +0000</pubDate>
      </item>
      <item>
         <title>How to Replicate the World's 10 Most Amazing Network Failures</title>
         <link>http://www.itsecurity.com/events/10-most-amazing-network-failures/</link>
         <description>On-Demand Webinar &amp;gt; Watch Now!SPONSORED BY: Juniper NetworksWatch this FREE on-demand webinar to hear the experts walk you through the 10 most famous outages and how to make sure you avoid anything...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/10-most-amazing-network-failures/</guid>
         <pubDate>Sat, 20 Feb 2010 00:50:26 +0000</pubDate>
      </item>
      <item>
         <title>3 Game-Changing Strategies for Using ERP: How Businesses Can Innovate, Become More Efficient &amp; Drive Real Growth in 2010</title>
         <link>http://www.itsecurity.com/events/game-changing-erp/</link>
         <description>On-Demand Webcast&amp;gt;&amp;nbsp; Watch Now!SPONSORED BY: SageWatch this FREE on-demand webcast to hear from industry leaders as they walk you through 3 strategies for using ERP to drive productivity and ef...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/game-changing-erp/</guid>
         <pubDate>Wed, 03 Feb 2010 20:05:47 +0000</pubDate>
      </item>
      <item>
         <title>Driving IT Cost-Efficiency, Security and Compliance in 2010</title>
         <link>http://www.itsecurity.com/events/2010-data-center/</link>
         <description>On-Demand Webcast&amp;gt;Watch Now! SPONSORED BY: TripwireWatch this FREE on-demand webcast and hear from leading IT experts about ways organizations are leveraging technologies&amp;nbsp;such as virtualizatio...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/2010-data-center/</guid>
         <pubDate>Wed, 03 Feb 2010 01:30:36 +0000</pubDate>
      </item>
      <item>
         <title>IT Security Ask the Experts: Top Queries for January, 2010</title>
         <link>http://www.itsecurity.com/features/top-queries-january-2010-020210/</link>
         <description>This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/features/top-queries-january-2010-020210/</guid>
         <pubDate>Tue, 02 Feb 2010 22:18:18 +0000</pubDate>
      </item>
      <item>
         <title>IT Security Ask the Experts: Top Queries for December, 2009</title>
         <link>http://www.itsecurity.com/features/ask-experts-dec09-010410/</link>
         <description>This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/features/ask-experts-dec09-010410/</guid>
         <pubDate>Tue, 05 Jan 2010 01:45:49 +0000</pubDate>
      </item>
      <item>
         <title>15 Major Reasons Businesses' Security Gets Compromised</title>
         <link>http://www.itsecurity.com/features/businesses-security-comprimised-120209/</link>
         <description>In a world of ever-advancing technology and development, many company heads often get lost in the bustle and get swept up in the sea of buzzwords that happen to be popular at any given moment. They ...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/features/businesses-security-comprimised-120209/</guid>
         <pubDate>Thu, 03 Dec 2009 00:01:38 +0000</pubDate>
      </item>
      <item>
         <title>IT Security Ask the Experts: Top Queries for November, 2009</title>
         <link>http://www.itsecurity.com/features/ask-experts-nov09-120209/</link>
         <description>This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/features/ask-experts-nov09-120209/</guid>
         <pubDate>Wed, 02 Dec 2009 22:03:17 +0000</pubDate>
      </item>
      <item>
         <title>Ten International Organizations trying to Hack into Your Computer</title>
         <link>http://www.itsecurity.com/features/international-orgs-hacking-120209/</link>
         <description>Hackers have been around since the early development of computers. Although they have gone by different names at different times, they&amp;#39;ve been fundamentally known as malicious all-knowing individu...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/features/international-orgs-hacking-120209/</guid>
         <pubDate>Wed, 02 Dec 2009 18:16:02 +0000</pubDate>
      </item>
      <item>
         <title>The 5 Biggest Pains IT Faces with Telecommuting and How to Solve Them</title>
         <link>http://www.itsecurity.com/events/5-biggest-pains-telecommuting-its/</link>
         <description>On-Demand Webinar &amp;gt; &amp;gt;&amp;gt; Watch Now! SPONSORED BY: HP Imaging and Printing GroupBy 2013, there will be 10 million telecommuters in the U.S., according to research firm IDC&amp;sup1;. Watch this FREE...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/5-biggest-pains-telecommuting-its/</guid>
         <pubDate>Wed, 25 Nov 2009 20:44:34 +0000</pubDate>
      </item>
      <item>
         <title>Only the Mobile Enterprise will Survive:  10 Practical Strategies for Supporting a Next-Generation Mobile Workforce</title>
         <link>http://www.itsecurity.com/events/next-generation-mobile-enterprise-its/</link>
         <description>WHEN: Wed, November 18Time: 10am PT / 1pm ET&amp;nbsp; Join Now!SPONSORED BY: Nortel and AT&amp;amp;TJoin leading mobility experts to hear why only the mobile enterprise will survive! Join Now!Why the mobile ...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/next-generation-mobile-enterprise-its/</guid>
         <pubDate>Thu, 12 Nov 2009 00:04:08 +0000</pubDate>
      </item>
      <item>
         <title>Top 5 Compliance Challenges Keeping IT Directors Awake At Night</title>
         <link>http://www.itsecurity.com/events/top-5-compliance-challenges-its/</link>
         <description>On-Demand Webinar &amp;gt; Watch Now! SPONSORED BY: TripwireWatch this FREE on-demand webinar to learn how to overcome the top 5 compliance challenges keeping IT directors awake at night! Watch Now! Overc...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/top-5-compliance-challenges-its/</guid>
         <pubDate>Wed, 11 Nov 2009 23:26:19 +0000</pubDate>
      </item>
      <item>
         <title>IT Security Ask the Experts: October, 2009</title>
         <link>http://www.itsecurity.com/features/ask-experts-oct09-110509/</link>
         <description>This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/features/ask-experts-oct09-110509/</guid>
         <pubDate>Thu, 05 Nov 2009 23:18:30 +0000</pubDate>
      </item>
      <item>
         <title>Smart Green IT: How to Cut Energy Costs Across Your IT Environment</title>
         <link>http://www.itsecurity.com/events/smart-green-it-its/</link>
         <description>WHEN:&amp;nbsp; Wednesday, October 28th10am PT / 1pm ET Join Now!&amp;gt;&amp;gt; SPONSORED BY:&amp;nbsp;  AT&amp;amp;T and NortelJoin this FREE live webinar to learn how you can save energy and costs effectively across ...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/smart-green-it-its/</guid>
         <pubDate>Wed, 21 Oct 2009 00:47:40 +0000</pubDate>
      </item>
      <item>
         <title>How Web Controls Are Changing Audio Conferencing</title>
         <link>http://www.itsecurity.com/events/next-generation-audio-conferencing/</link>
         <description>WHEN:Wednesday, October 21Time: 11am PT / 2pm ET  Join Now!&amp;gt;&amp;gt; SPONSORED  BY: Citrix Online Audio Services GroupJoin us for this FREE live webcast to hear Marc Beattie of Wainhouse Research as he...</description>
         <guid isPermaLink="false">http://www.itsecurity.com/events/next-generation-audio-conferencing/</guid>
         <pubDate>Fri, 02 Oct 2009 21:21:58 +0000</pubDate>
      </item>
   </channel>
</rss>
<!-- fe3.yql.bf1.yahoo.com compressed/chunked Thu Oct  1 23:10:15 UTC 2015 -->
