<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 19:56:49 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@jonsmith/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[AI provides an urgent solution to evolving ransomware threats facing healthcare]]></title><description><![CDATA[ Artificial intelligence that can quickly identify patterns of risky behavior may be the only viable solution to protect health systems against an influx of ransomware attacks.  The use of AI]]></description><link>http://direct.ecency.com/tech/@jonsmith/3nd25n-ai-provides-an-urgent-solution-to-evolving-ransomware-threats-facing-healthcare</link><guid isPermaLink="true">http://direct.ecency.com/tech/@jonsmith/3nd25n-ai-provides-an-urgent-solution-to-evolving-ransomware-threats-facing-healthcare</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 15 Mar 2017 23:46:33 GMT</pubDate></item><item><title><![CDATA[McCaskill asks DHS about 'critical infrastructure' designation]]></title><description><![CDATA[ FIRST IN MC: MCCASKILL QUESTIONS DHS — A top Senate Democrat, Claire McCaskill, wants to know what it actually meant when the Homeland Security Department labeled election systems as “critical]]></description><link>http://direct.ecency.com/hacking/@jonsmith/mccaskill-asks-dhs-about-critical-infrastructure-designation</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@jonsmith/mccaskill-asks-dhs-about-critical-infrastructure-designation</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 15 Mar 2017 23:40:57 GMT</pubDate></item><item><title><![CDATA[How AI Can Help Fight Healthcare Ransomware Threats]]></title><description><![CDATA[The Institute for Critical Infrastructure Technology discusses in a recent paper how artificial Intelligence can fight against healthcare ransomware threats. March 15, 2017 - Healthcare is facing more]]></description><link>http://direct.ecency.com/health/@jonsmith/how-ai-can-help-fight-healthcare-ransomware-threats</link><guid isPermaLink="true">http://direct.ecency.com/health/@jonsmith/how-ai-can-help-fight-healthcare-ransomware-threats</guid><category><![CDATA[health]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 15 Mar 2017 23:32:48 GMT</pubDate></item><item><title><![CDATA[AI provides an urgent solution to evolving ransomware threats facing healthcare]]></title><description><![CDATA[ Artificial intelligence that can quickly identify patterns of risky behavior may be the only viable solution to protect health systems against an influx of ransomware attacks.  The use of AI]]></description><link>http://direct.ecency.com/ransomware/@jonsmith/ai-provides-an-urgent-solution-to-evolving-ransomware-threats-facing-healthcare</link><guid isPermaLink="true">http://direct.ecency.com/ransomware/@jonsmith/ai-provides-an-urgent-solution-to-evolving-ransomware-threats-facing-healthcare</guid><category><![CDATA[ransomware]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 15 Mar 2017 23:24:30 GMT</pubDate></item><item><title><![CDATA[Can Artificial Intelligence cure the Ransomware pandemic on Healthcare?]]></title><description><![CDATA[ A new report from the Institute of Critical Infrastructure Technology considers the possibility that artificial intelligence might be the cure for the security ills of the healthcare industry ]]></description><link>http://direct.ecency.com/icit/@jonsmith/can-artificial-intelligence-cure-the-ransomware-pandemic-on-healthcare</link><guid isPermaLink="true">http://direct.ecency.com/icit/@jonsmith/can-artificial-intelligence-cure-the-ransomware-pandemic-on-healthcare</guid><category><![CDATA[icit]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 15 Mar 2017 23:05:24 GMT</pubDate></item><item><title><![CDATA[SNYPR Recognized as a Strong Performer in The Forrester Security Analytics Wave Report]]></title><description><![CDATA[ Securonix has been named a “strong performer” by the leading global research and advisory firm Forrester in The Forrester Wave™: Security Analytics Platforms, Q1 2017 Report.   Forrester]]></description><link>http://direct.ecency.com/hacking/@jonsmith/4hgo47-snypr-recognized-as-a-strong-performer-in-the-forrester-security-analytics-wave-report</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@jonsmith/4hgo47-snypr-recognized-as-a-strong-performer-in-the-forrester-security-analytics-wave-report</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:55:24 GMT</pubDate></item><item><title><![CDATA[A User and Entity Behavior Analytics Scoring System Explained]]></title><description><![CDATA[ How risk assessment for UEBA (user entity behavior analytics) works is not unlike how humans assess risk in our surrounding environment. When in an unfamiliar setting, our brain constantly takes]]></description><link>http://direct.ecency.com/hacking/@jonsmith/a-user-and-entity-behavior-analytics-scoring-system-explained</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@jonsmith/a-user-and-entity-behavior-analytics-scoring-system-explained</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:48:06 GMT</pubDate></item><item><title><![CDATA[Whats Next from Google Cloud: Scenes from Google Next]]></title><description><![CDATA[ Google Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this]]></description><link>http://direct.ecency.com/google/@jonsmith/whats-next-from-google-cloud-scenes-from-google-next</link><guid isPermaLink="true">http://direct.ecency.com/google/@jonsmith/whats-next-from-google-cloud-scenes-from-google-next</guid><category><![CDATA[google]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:42:57 GMT</pubDate></item><item><title><![CDATA[Parsons Named as a World’s Most Ethical Company by Ethisphere Institute for Eighth Year in a Row]]></title><description><![CDATA[PASADENA, CA (March 13, 2017) – Parsons is pleased to announce that it has been named by the Ethisphere Institute—a global leader in defining and advancing the standards of ethical business practices—as]]></description><link>http://direct.ecency.com/health/@jonsmith/parsons-named-as-a-world-s-most-ethical-company-by-ethisphere-institute-for-eighth-year-in-a-row</link><guid isPermaLink="true">http://direct.ecency.com/health/@jonsmith/parsons-named-as-a-world-s-most-ethical-company-by-ethisphere-institute-for-eighth-year-in-a-row</guid><category><![CDATA[health]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:37:51 GMT</pubDate></item><item><title><![CDATA[DOING THREAT INTEL THE HARD WAY - PART 5: ANALYZE THREAT INTELLIGENCE]]></title><description><![CDATA[ The Analyst work flow must provide a repeatable process to analyze the output of the integrations you have created in the previous steps.  For example, if the SIEM determines that a server is]]></description><link>http://direct.ecency.com/tech/@jonsmith/doing-threat-intel-the-hard-way-part-5-analyze-threat-intelligence</link><guid isPermaLink="true">http://direct.ecency.com/tech/@jonsmith/doing-threat-intel-the-hard-way-part-5-analyze-threat-intelligence</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:31:24 GMT</pubDate></item><item><title><![CDATA[ITSM: rationalizing processes with tooling requirements]]></title><description><![CDATA[It’s a natural response for many IT organizations to think about how implementing tools can be the solution to IT problems. But it’s a big problem, as there’s no magic pixie dust sprinkled over a tool]]></description><link>http://direct.ecency.com/it/@jonsmith/itsm-rationalizing-processes-with-tooling-requirements</link><guid isPermaLink="true">http://direct.ecency.com/it/@jonsmith/itsm-rationalizing-processes-with-tooling-requirements</guid><category><![CDATA[it]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:24:33 GMT</pubDate></item><item><title><![CDATA[Facilities Management Implementations Expose Data Gaps]]></title><description><![CDATA[ The promise of the latest Facilities Management (FM) software is an exciting one of reduced asset and space management costs, increased productivity and a better-managed asset lifecycle.  One]]></description><link>http://direct.ecency.com/software/@jonsmith/facilities-management-implementations-expose-data-gaps</link><guid isPermaLink="true">http://direct.ecency.com/software/@jonsmith/facilities-management-implementations-expose-data-gaps</guid><category><![CDATA[software]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:17:39 GMT</pubDate></item><item><title><![CDATA[Build your plan for the 2017 HPE Software Government Summit]]></title><description><![CDATA[We look forward to your attendance on Wednesday, March 22 for the 7th Annual Hewlett Packard Enterprise Software Government Summit. You'll gain new insights into the technology and innovations HPE is bringing]]></description><link>http://direct.ecency.com/technology/@jonsmith/build-your-plan-for-the-2017-hpe-software-government-summit</link><guid isPermaLink="true">http://direct.ecency.com/technology/@jonsmith/build-your-plan-for-the-2017-hpe-software-government-summit</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Tue, 14 Mar 2017 00:05:39 GMT</pubDate></item><item><title><![CDATA[CISSP SPOTLIGHT: ALBERT TORRES]]></title><description><![CDATA[ I had been in the IT industry for over 10 years and our company was creating its first software as a service (SaaS) software offering. The previous software we had developed was only used in house.]]></description><link>http://direct.ecency.com/tech/@jonsmith/cissp-spotlight-albert-torres</link><guid isPermaLink="true">http://direct.ecency.com/tech/@jonsmith/cissp-spotlight-albert-torres</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Mon, 13 Mar 2017 23:56:30 GMT</pubDate></item><item><title><![CDATA[ICIT Briefing - Artificial Intelligence & Machine Learning: Cybersecurity's Paradigm Shift]]></title><description><![CDATA[  ICIT is pleased to host this briefing in support of its current initiative on artificial intelligence and non-signature based technologies to protect our critical infrastructures.  During this]]></description><link>http://direct.ecency.com/healthcare/@jonsmith/icit-briefing-artificial-intelligence-and-machine-learning-cybersecurity-s-paradigm-shift</link><guid isPermaLink="true">http://direct.ecency.com/healthcare/@jonsmith/icit-briefing-artificial-intelligence-and-machine-learning-cybersecurity-s-paradigm-shift</guid><category><![CDATA[healthcare]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Mon, 13 Mar 2017 23:49:00 GMT</pubDate></item><item><title><![CDATA[Why Healthcare Is The Next Big Target For Ransomware]]></title><description><![CDATA[ The increasing digitization of medical data has meant more streamlined processes for patients and healthcare providers; but the transformation has also been an opportunity for malicious cyber attackers]]></description><link>http://direct.ecency.com/health/@jonsmith/why-healthcare-is-the-next-big-target-for-ransomware</link><guid isPermaLink="true">http://direct.ecency.com/health/@jonsmith/why-healthcare-is-the-next-big-target-for-ransomware</guid><category><![CDATA[health]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Mon, 13 Mar 2017 23:43:03 GMT</pubDate></item><item><title><![CDATA[WikiLeaks’ Release on CIA Hacking Tools Raises Concerns about IoT Security to New Heights]]></title><description><![CDATA[ The concept of the “Internet of Things” exploded in 2016, with many new devices able to connect to the Internet that weren’t before. Aside from the usual devices such as smartphones and personal]]></description><link>http://direct.ecency.com/security/@jonsmith/wikileaks-release-on-cia-hacking-tools-raises-concerns-about-iot-security-to-new-heights</link><guid isPermaLink="true">http://direct.ecency.com/security/@jonsmith/wikileaks-release-on-cia-hacking-tools-raises-concerns-about-iot-security-to-new-heights</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Mon, 13 Mar 2017 23:26:18 GMT</pubDate></item><item><title><![CDATA[More Thoughts on Vendor Consolidation in the Security Market]]></title><description><![CDATA[ In my last blog post, I discussed a new major trend in the security market, which is that security buyers are increasingly looking to consolidate vendors and want more of a platform approach to security]]></description><link>http://direct.ecency.com/security/@jonsmith/more-thoughts-on-vendor-consolidation-in-the-security-market</link><guid isPermaLink="true">http://direct.ecency.com/security/@jonsmith/more-thoughts-on-vendor-consolidation-in-the-security-market</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Sat, 11 Mar 2017 00:26:51 GMT</pubDate></item><item><title><![CDATA[The Potential POS Breach]]></title><description><![CDATA[ Exabeam recently discovered unusual behavior at one of our retail customers. On some of the most sensitive point of sale (POS) devices, a local account was added to a privileged active directory]]></description><link>http://direct.ecency.com/tech/@jonsmith/the-potential-pos-breach</link><guid isPermaLink="true">http://direct.ecency.com/tech/@jonsmith/the-potential-pos-breach</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Sat, 11 Mar 2017 00:18:18 GMT</pubDate></item><item><title><![CDATA[SNYPR Recognized as a Strong Performer in The Forrester Security Analytics Wave Report]]></title><description><![CDATA[ Securonix has been named a “strong performer” by the leading global research and advisory firm Forrester in The Forrester Wave™: Security Analytics Platforms, Q1 2017 Report.   Forrester]]></description><link>http://direct.ecency.com/tech/@jonsmith/snypr-recognized-as-a-strong-performer-in-the-forrester-security-analytics-wave-report</link><guid isPermaLink="true">http://direct.ecency.com/tech/@jonsmith/snypr-recognized-as-a-strong-performer-in-the-forrester-security-analytics-wave-report</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Sat, 11 Mar 2017 00:04:36 GMT</pubDate></item></channel></rss>