<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 13 May 2026 05:51:04 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@jasonbell/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[31 Health Data Breaches Disclosed in January as HHS Fines for Late Reporting]]></title><description><![CDATA[ 2017 has kicked off with a huge proportion of insider threats, as January data from disclosed breaches reveals that 59.2% of breached patient records were the result of insiders.   This]]></description><link>http://direct.ecency.com/health/@jasonbell/31-health-data-breaches-disclosed-in-january-as-hhs-fines-for-late-reporting</link><guid isPermaLink="true">http://direct.ecency.com/health/@jasonbell/31-health-data-breaches-disclosed-in-january-as-hhs-fines-for-late-reporting</guid><category><![CDATA[health]]></category><dc:creator><![CDATA[jasonbell]]></dc:creator><pubDate>Thu, 02 Mar 2017 01:02:30 GMT</pubDate></item><item><title><![CDATA[As wireless devices flourish, network security pros break into cold sweats]]></title><description><![CDATA[ WASHINGTON  Sure, your office may seem clean. But it’s probably not. Invisible network pollution contaminates the space, and it may open a door to evildoers.The pollution comes from the growing]]></description><link>http://direct.ecency.com/security/@jasonbell/as-wireless-devices-flourish-network-security-pros-break-into-cold-sweats</link><guid isPermaLink="true">http://direct.ecency.com/security/@jasonbell/as-wireless-devices-flourish-network-security-pros-break-into-cold-sweats</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[jasonbell]]></dc:creator><pubDate>Thu, 02 Mar 2017 00:07:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/6KincGa12EBFJv7FDkf6n8E7ntEB5tGCJofncrsRHoDQfMpZTaNyZ9xW14EwkXLXR3MUmnwcaeuUhh3VeSieaMVW8JDDFAZnNR6wu4xffq5a94vEXA9HkWD8Vd2fqs1QNmZj7iJDJK1e8yh7jNt691eP5pSPmDQnvJdHYjT7nngSLvBUpZynzK?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers Use New Tactic at Austrian Hotel: Locking the Doors]]></title><description><![CDATA[ The ransom demand arrived one recent morning by email, after about a dozen guests were locked out of their rooms at the lakeside Alpine hotel in Austria.The electronic key system at the picturesque]]></description><link>http://direct.ecency.com/hacker/@jasonbell/hackers-use-new-tactic-at-austrian-hotel-locking-the-doors</link><guid isPermaLink="true">http://direct.ecency.com/hacker/@jasonbell/hackers-use-new-tactic-at-austrian-hotel-locking-the-doors</guid><category><![CDATA[hacker]]></category><dc:creator><![CDATA[jasonbell]]></dc:creator><pubDate>Fri, 24 Feb 2017 15:36:51 GMT</pubDate></item></channel></rss>