<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 04 Apr 2026 23:37:18 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@eddiesegal/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[The Beginner's Guide to Automating EBS Snapshots]]></title><description><![CDATA[Image Source EBS is a cloud-based block storage service offered by Amazon Web Services (AWS). In EBS, your data is saved into blocks, also known as EBS volumes. To protect data, EBS places volumes within]]></description><link>http://direct.ecency.com/aws/@eddiesegal/the-beginner-s-guide-to-automating-ebs-snapshots</link><guid isPermaLink="true">http://direct.ecency.com/aws/@eddiesegal/the-beginner-s-guide-to-automating-ebs-snapshots</guid><category><![CDATA[aws]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Mon, 10 Feb 2020 15:36:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm3sWQK3HKkuAMedF1JSX7yKgEqYjnyTKPwrcsdHmaRdvX2JWMNjKbfUdhEw9bswr4qeUtdubtAdh9N8pNp1YgjpQQXuPvJENTSYCjdtRiVanqUo5Hhpuhg2we3FcKgr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Incident Response 101: What Is a CSIRT?]]></title><description><![CDATA[Image Source In order to protect increasingly distributed digital environments, cybersecurity professionals are often required to quickly respond to security events. The team that responds to events is]]></description><link>http://direct.ecency.com/csirt/@eddiesegal/incident-response-101-what-is-a-csirt</link><guid isPermaLink="true">http://direct.ecency.com/csirt/@eddiesegal/incident-response-101-what-is-a-csirt</guid><category><![CDATA[csirt]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Tue, 28 Jan 2020 13:25:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFVtpM8rCsJzDgecVMtkz4jpzBsszXjhqan9o1obAhC8FFd1YZJbLFogK9viNzR6XTRx2Y7copHtFJFGii1CAwCLnJJcQbqXLdzYG2czR8ekB9TJT64FkPeCugjnWRE7tS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Endpoint Security: What It Is and Why You Need It]]></title><description><![CDATA[Protecting a network can be a daunting task. A typical network can consist of a mix of desktop computers, laptops, tablets, and smartphones. Every one of these endpoint devices can be a point of entry]]></description><link>http://direct.ecency.com/endpoint/@eddiesegal/endpoint-security-what-it-is-and-why-you-need-it</link><guid isPermaLink="true">http://direct.ecency.com/endpoint/@eddiesegal/endpoint-security-what-it-is-and-why-you-need-it</guid><category><![CDATA[endpoint]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Mon, 09 Dec 2019 08:17:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrTps6cjBmVHvN4WKRELnFy9u363NA4sovnHTaMGvoEqnXeZnUQhkm3ykjYKY6eoVppdxRJ5nNu3u5Sn1GQTn4svA3g?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Stay Safe From the Eternalblue Exploit]]></title><description><![CDATA[High-profile cyber attacks are infecting tens of thousands of computers every day. The success of many of these attacks is attributed to EternalBlue, which is a Microsoft Windows security vulnerability.]]></description><link>http://direct.ecency.com/security/@eddiesegal/how-to-stay-safe-from-the-eternalblue-exploit</link><guid isPermaLink="true">http://direct.ecency.com/security/@eddiesegal/how-to-stay-safe-from-the-eternalblue-exploit</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Sun, 10 Nov 2019 07:31:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHRfvmtd53nmEJ94xpKydwmbSC5H5svBACH81KZaptM1Y1YXoJYo3rkmw4QzEyyrpXy69q3yLWLuxp6osGx5qpQ6kJTGiN1kzT3QVx9vPCC3rqBPcTnCWSq9gjFbiZ7Ua?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Do You Need a Managed Kubernetes Solution?]]></title><description><![CDATA[With many enterprises relying on multiple computing environments for their workloads, it is important to have a way to transfer the data easily and reliably from one environment to another. You can make]]></description><link>http://direct.ecency.com/kubernetes/@eddiesegal/do-you-need-a-managed-kubernetes-solution</link><guid isPermaLink="true">http://direct.ecency.com/kubernetes/@eddiesegal/do-you-need-a-managed-kubernetes-solution</guid><category><![CDATA[kubernetes]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Wed, 11 Sep 2019 19:15:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zPGPDCMyS8i1wdQR4t1vmGR4WJvzb9w3tak3GopuPH878kzezpG7CuSgNQLXSWq7BoPeGhcz1KhXzdJhBFPCZEX1ZCSfutaoUuzPiFLnFgMed9obU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Top Benefits of Migrating to AWS]]></title><description><![CDATA[Image by Kranich17 from Pixabay What Is AWS? Amazon Web Services (AWS) is a cloud provider that offers computing power, database and file storage, content delivery, web hosting, and more to businesses]]></description><link>http://direct.ecency.com/aws/@eddiesegal/top-benefits-of-migrating-to-aws</link><guid isPermaLink="true">http://direct.ecency.com/aws/@eddiesegal/top-benefits-of-migrating-to-aws</guid><category><![CDATA[aws]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Wed, 14 Aug 2019 22:36:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxsTkPYAARp78o5cJA1o6Chv9x98TzCFT6v5G77FCMtqWRFYVJmqh6TiY8aZEfJ7vU4j7j7owEW3rGZpGCT3oPBMmWtkvVASj2hAr1PqrwW22FKcaewjxFvkdyVurwTLhfFWM1MzfSke?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DAM Solutions: Top Features and Benefits You Need to Know]]></title><description><![CDATA[Image by Gerd Altmann from Pixabay There are few things more frustrating for a marketer daily work than spend hours looking for a lost file. You can spend hours searching through endless folders, servers]]></description><link>http://direct.ecency.com/digitalmarketing/@eddiesegal/dam-solutions-top-features-and-benefits-you-need-to-know</link><guid isPermaLink="true">http://direct.ecency.com/digitalmarketing/@eddiesegal/dam-solutions-top-features-and-benefits-you-need-to-know</guid><category><![CDATA[digitalmarketing]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Thu, 08 Aug 2019 18:13:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/TZjG7hXReeVoAvXt2X6pMxYAb3q65xMju8wryWxKrsghkQ7VdMCLKV2uu5w5ZDWMwVQawSvW4YokFjeLd9SMJGCv8dBTKFvpmKXhYUULUwF8YjoPcBRE1Ad7TsUkjSMXFHsyUYqM9uvrut?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Best Practices and Tools for Delivering Secure Software With SecOps]]></title><description><![CDATA[Image source: Pixabay What Is SecOps? SecOps is the collaboration of security and operations teams to improve the security of an organization. This collaborative approach is also intended to increase the]]></description><link>http://direct.ecency.com/security/@eddiesegal/best-practices-and-tools-for-delivering-secure-software-with-secops</link><guid isPermaLink="true">http://direct.ecency.com/security/@eddiesegal/best-practices-and-tools-for-delivering-secure-software-with-secops</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Wed, 31 Jul 2019 18:00:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/21PRtjKRXPQybj4WUXScWv5QPLninWRxfbcWNsx7SenD7FqogLJFX586xRQaYdSPjLyvTtjAz4FuBwWDgM6GkBkDRn1PiTPSQdt5MQFxUu3okG5xkPXg4Uf5Ea1vXM41D91AQRF2jgCixEYDFBGRRok?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Digital Asset Management: Benefits and Best Practices]]></title><description><![CDATA[Photo by Lisa Fotios from Pexels If your organization uses any kind of digital media, chances are you have a system to organize it and access it. It may be chaotic and poorly managed but your assets are]]></description><link>http://direct.ecency.com/dam/@eddiesegal/digital-asset-management-benefits-and-best-practices</link><guid isPermaLink="true">http://direct.ecency.com/dam/@eddiesegal/digital-asset-management-benefits-and-best-practices</guid><category><![CDATA[dam]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Mon, 29 Jul 2019 13:11:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2CwnDyeL7SRXDBVj6NtmCD5H6MtSGL67PPVU3VFHdaaQW12XJbykUBpavWpFRXp266fBa8Cjsjgv8s5xijncJX4dNmhbJSSDyAnfeSzX6TCkejN12o8keTdh8BWGm5do5x2X8jeVM95sAYWK9zzVYtuaivr6jCcgAERtNfPaMvUy7QKL1ukLE?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>