<?xml version="1.0" encoding="UTF-8"?><rss xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0"><channel><title>Network Security Journal - The Network Security Industry's Web Resource</title><description>The Network Security Industry's Web Resource</description><link>http://www.networksecurityjournal.com/</link><item><title>The Success and Failure of Spam Control </title><link>http://www.networksecurityjournal.com/features/success-failure-spam-control-032608/</link><description>The tide has finally turned against spammers, with new tools, practices and attitudes slowly beginning to neutralize spam&amp;#39;s impact. Or has it? Spammers also seem to be winning, burying enterprise ... </description><guid>http://www.networksecurityjournal.com/features/success-failure-spam-control-032608/</guid><pubDate>Wed, 26 Mar 2008 15:32:42 -0700</pubDate></item>
<item><title>The Firewall-Management Survival Guide</title><link>http://www.networksecurityjournal.com/features/firewall-management-guide-031108/</link><description>Security threats posed by IM (instant messaging), P2P (peer-to-peer) networking and other emerging communications modes are making firewall management a more important &amp;mdash; and increasingly challen... </description><guid>http://www.networksecurityjournal.com/features/firewall-management-guide-031108/</guid><pubDate>Tue, 11 Mar 2008 12:48:51 -0700</pubDate></item>
<item><title>NAC: The New Frontline in Data Security</title><link>http://www.networksecurityjournal.com/features/nac-frontline-022708/</link><description>As businesses struggle to secure their IT resources, many are tuning to NAC (Network Access Control) products. NAC tools are different from traditional security technologies and practices that focus o... </description><guid>http://www.networksecurityjournal.com/features/nac-frontline-022708/</guid><pubDate>Wed, 27 Feb 2008 15:00:02 -0800</pubDate></item>
<item><title>The Rise of Botnet Infections</title><link>http://www.networksecurityjournal.com/features/botnets-rising-021308/</link><description>Botnets! The mere thought of botnet-infected office computers stealing data, hosting fraudulent Web sites and participating in DoS (denial of service) attacks is enough to strike fear and loathing int... </description><guid>http://www.networksecurityjournal.com/features/botnets-rising-021308/</guid><pubDate>Wed, 13 Feb 2008 11:45:53 -0800</pubDate></item>
<item><title>How to Build a Bulletproof Backup Strategy</title><link>http://www.networksecurityjournal.com/features/bulletproof-backup-strategy-012908/</link><description>A disaster is never convenient, but a storm, a fire, an earthquake or another calamity can be particularly devastating when it strikes an unprepared business.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;... </description><guid>http://www.networksecurityjournal.com/features/bulletproof-backup-strategy-012908/</guid><pubDate>Tue, 29 Jan 2008 10:13:42 -0800</pubDate></item>
<item><title>The Malware Burden</title><link>http://www.networksecurityjournal.com/features/malware-burden-012208/</link><description>Everyone knows that malware is a pain in the backside, but many business owners and managers still don&amp;#39;t fully understand that viruses, worms, Trojan horses and other bits of digital nastiness are... </description><guid>http://www.networksecurityjournal.com/features/malware-burden-012208/</guid><pubDate>Tue, 22 Jan 2008 11:57:27 -0800</pubDate></item>
<item><title>DoS Attacks Take Aim at Small Business</title><link>http://www.networksecurityjournal.com/features/DoS-attacks-011708/</link><description>Do you believe that DoS (denial-of-service) attacks only strike Web sites operated by megabusinesses like Microsoft and Wal-Mart Stores Inc.? Think again. In its December 2007 report on the state of I... </description><guid>http://www.networksecurityjournal.com/features/DoS-attacks-011708/</guid><pubDate>Thu, 17 Jan 2008 09:32:24 -0800</pubDate></item>
<item><title>Developing a Bulletproof Patch-Management Plan</title><link>http://www.networksecurityjournal.com/features/bulletproof-patch-plan-010808/</link><description>It&amp;#39;s a situation that most businesses face: how to organize, distribute and monitor software-patch deployment without imperiling network-attached equipment.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbs... </description><guid>http://www.networksecurityjournal.com/features/bulletproof-patch-plan-010808/</guid><pubDate>Tue, 08 Jan 2008 09:38:02 -0800</pubDate></item>
<item><title>Webinar: Tools To Attract &amp; Retain New Customers (January 24, 2008)</title><link>http://www.networksecurityjournal.com/events/attract-retain-customers-nsj/</link><description> WHEN: January 24, 200810:00 AM PT / 1:00 PM ET   WHAT: What are the challenges and benefits of implementing CRM for small-medium enterprise? How do you create a broader 	customer relationship? 	Is CR... </description><guid>http://www.networksecurityjournal.com/events/attract-retain-customers-nsj/</guid><pubDate>Fri, 04 Jan 2008 12:22:34 -0800</pubDate></item>
<item><title>Escape From Network Patch-Management Hell</title><link>http://www.networksecurityjournal.com/features/patch-management-hell-122107/</link><description>Software patches, which offer product fixes, extra features, anti-malware capabilities and other add-ons, are a fact of life. But as software vendors strive to supply a steady stream of product enhanc... </description><guid>http://www.networksecurityjournal.com/features/patch-management-hell-122107/</guid><pubDate>Fri, 21 Dec 2007 11:54:31 -0800</pubDate></item>
<item><title>IDC Security Summit - New York, N.Y. (September 18, 2008)</title><link>http://www.networksecurityjournal.com/events/idc-security-summit-2008/</link><description>When: September 18, 2008&amp;nbsp; Where: New York Marriott Financial Center&amp;nbsp;85 West Street New York, N.Y. 10006&amp;nbsp; What: The annual IDC Security Summit brings together Security and IT executives ... </description><guid>http://www.networksecurityjournal.com/events/idc-security-summit-2008/</guid><pubDate>Thu, 06 Dec 2007 16:24:10 -0800</pubDate></item>
<item><title>10 Strategic Network Investments</title><link>http://www.networksecurityjournal.com/features/10-strategic-network-investments/</link><description>Constrained by limited IT budgets, businesses must shop carefully for strategic network technologies that will provide the biggest bang for the buck. But with all of the network-related products now a... </description><guid>http://www.networksecurityjournal.com/features/10-strategic-network-investments/</guid><pubDate>Thu, 29 Nov 2007 10:14:50 -0800</pubDate></item>
<item><title>Reading the Web-Log Tea Leaves</title><link>http://www.networksecurityjournal.com/features/reading-web-logs-111407/</link><description>You can learn a lot from a log file &amp;mdash; at least once you figure out the meaning of all of the cryptic messages it contains.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Related Art... </description><guid>http://www.networksecurityjournal.com/features/reading-web-logs-111407/</guid><pubDate>Wed, 14 Nov 2007 09:43:01 -0800</pubDate></item>
<item><title>Network Security Training and Certification</title><link>http://www.networksecurityjournal.com/events/nsj-training-cert/</link><description>Search our catalog to find the right training course for you.</description><guid>http://www.networksecurityjournal.com/events/nsj-training-cert/</guid><pubDate>Thu, 08 Nov 2007 12:14:22 -0800</pubDate></item>
<item><title>The Packet Racket</title><link>http://www.networksecurityjournal.com/features/packet-racket-110707/</link><description>What you don&amp;#39;t know about incoming IP packets can hurt you, your network, your servers and your end users. That&amp;#39;s because all packets aren&amp;#39;t alike. Most packets are friendly and cause no w... </description><guid>http://www.networksecurityjournal.com/features/packet-racket-110707/</guid><pubDate>Wed, 07 Nov 2007 10:49:38 -0800</pubDate></item>
<item><title>Company Security Policy 101</title><link>http://www.networksecurityjournal.com/features/security-policy-101-102307/</link><description>Every network needs a security policy that provides both guidelines and guidance. But exactly what items should such a policy include?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Relat... </description><guid>http://www.networksecurityjournal.com/features/security-policy-101-102307/</guid><pubDate>Tue, 23 Oct 2007 14:38:56 -0700</pubDate></item>
<item><title>Why Black-Hat Hackers Become White-Hat Heroes</title><link>http://www.networksecurityjournal.com/features/black-hats-become-white-hats-091107/</link><description>Hackers are often painted negatively with a single, broad brushstroke. But there are bad hackers, &amp;quot;black hats&amp;quot; who write malware and do other evil things, and kinder, gentler &amp;quot;white hat... </description><guid>http://www.networksecurityjournal.com/features/black-hats-become-white-hats-091107/</guid><pubDate>Tue, 11 Sep 2007 09:21:43 -0700</pubDate></item>
<item><title>Can the Government Really Be Trusted With Your Data?</title><link>http://www.networksecurityjournal.com/features/government-trusted-with-data-090407/</link><description>A report released late last year by the House Committee on Government Reform paints a frightening picture of the lackadaisical approach many government agencies and employees take toward sensitive dat... </description><guid>http://www.networksecurityjournal.com/features/government-trusted-with-data-090407/</guid><pubDate>Tue, 04 Sep 2007 13:22:34 -0700</pubDate></item>
<item><title>The Definitive Guide to Network Security</title><link>http://www.networksecurityjournal.com/whitepaper/definitive-guide-to-network-security/</link><description>These comprehensive checklists on 9 different topics will improve your overall security posture, regardless of your current security prowess. We also provide links to the products that we recommend, a... </description><guid>http://www.networksecurityjournal.com/whitepaper/definitive-guide-to-network-security/</guid><pubDate>Fri, 27 Jul 2007 17:19:35 -0700</pubDate></item>
<item><title>Google Gets Serious About Security</title><link>http://www.networksecurityjournal.com/features/google-gets-serious-security/</link><description>Google wants to organize all of the world&amp;rsquo;s information. To do that it must access all that information. And to do that Google must convince everyone that its growing number of Google Apps are b... </description><guid>http://www.networksecurityjournal.com/features/google-gets-serious-security/</guid><pubDate>Wed, 25 Jul 2007 10:32:50 -0700</pubDate></item></channel></rss>