<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 16:57:28 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/bugheist/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[BugHeist Integrates its Software Testing and Patching Services with Penteston’s Penetration Testing Platform]]></title><description><![CDATA[Courtesy: Penteston BugHeist software bug reporting and remediation website is partnering with Tom Brennan, creator of Penteston, to provide software crowd testing services through an API to Penteston.]]></description><link>http://direct.ecency.com/bugheist/@bugheist/bugheist-integrates-its-software-testing-and-patching-services-with-penteston-s-penetration-testing-platform</link><guid isPermaLink="true">http://direct.ecency.com/bugheist/@bugheist/bugheist-integrates-its-software-testing-and-patching-services-with-penteston-s-penetration-testing-platform</guid><category><![CDATA[bugheist]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Sun, 01 Jul 2018 19:14:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvbEzXSPE6r7cdfgDUjdtv94dG2PprMfgTUucriYcK4wDJsRsR8A34FbL2vStfBjWX3yjX69bU6Pn2Vux?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Meet the Women Who Broke Enemy Codes in World War II]]></title><description><![CDATA[New York Times best-selling author and award-winning writer Liza Mundy and Montclair University associate professor Jessica Restaino highlighted the women who deciphered Japanese and German codes during]]></description><link>http://direct.ecency.com/bugheist/@bugheist/meet-the-women-who-helped-break-enemy-codes-in-world-war-ii</link><guid isPermaLink="true">http://direct.ecency.com/bugheist/@bugheist/meet-the-women-who-helped-break-enemy-codes-in-world-war-ii</guid><category><![CDATA[bugheist]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Wed, 06 Jun 2018 19:02:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvSNsRRm5YMUi3AzZSfvK17ktiYzDEn3QzLSGG9UbdnG27dvkaPmGtoShuhoXhugKtRZHzbw424QB1K8A?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Comic Book Series about Cybercrime Debuts at HACK NYC 2018]]></title><description><![CDATA[Gary Berman, marketing communications executive, founder of CybermanSecurity.org and cybercrime victim, shared the first edition of The CyberHero Adventures: Defenders of the Digital Universe series at]]></description><link>http://direct.ecency.com/cybercrime/@bugheist/new-comic-book-series-about-cybercrime-debuts-at-hack-nyc-2018</link><guid isPermaLink="true">http://direct.ecency.com/cybercrime/@bugheist/new-comic-book-series-about-cybercrime-debuts-at-hack-nyc-2018</guid><category><![CDATA[cybercrime]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Fri, 25 May 2018 14:07:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc14riaEeLCzGYopkqYBKxpGKqfNWfgr368M9UUYaY9VZR7w5FDJ5fJb7Pef7pvuW6tGVGxFVAzdyxa4jhkShpMqZ6ZpNNzCb8KJQ4dGu2t17CsELzi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[NYC Cyber Command’s NYC Secure Initiative Will Protect New Yorkers’ Wireless Data]]></title><description><![CDATA[HACK NYC 2018 kicked off its 3-day conference on May 8 with the details that New York City Cyber Command will launch NYC Secure by the end of 2018. This new citywide initiative will feature a free mobile]]></description><link>http://direct.ecency.com/privacy/@bugheist/nyc-cyber-command-s-nyc-secure-initiative-will-protect-new-yorkers-wireless-data</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@bugheist/nyc-cyber-command-s-nyc-secure-initiative-will-protect-new-yorkers-wireless-data</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Fri, 18 May 2018 23:01:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc18GVREvvsnAjfLwLF5qHHFduNHKinq58xZMp6Q4NztRapVLAsoMathrWVjmctHTBTcFYVNQM4ZeRjxthfE2NJQUqgmquBdQ8yJ4oLz2mGwYRRKFQA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Are You Ready to Protect Your Customers and Employees’ Privacy?]]></title><description><![CDATA[As the calendar counts down to May 25, 2018 when the European Union’s General Data Protection Regulation (GDPR) kicks in the $64,000 question is are companies ready? Under the EU Parliament’s GDPR, “all]]></description><link>http://direct.ecency.com/bugheist/@bugheist/are-you-ready-to-protect-your-customers-and-employees-privacy</link><guid isPermaLink="true">http://direct.ecency.com/bugheist/@bugheist/are-you-ready-to-protect-your-customers-and-employees-privacy</guid><category><![CDATA[bugheist]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Mon, 07 May 2018 14:45:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UondJxcjVaienfhVaNb7LJVWG6e787gaJZ1VMJNY3BgMyFWGoxfx7wBZrek3nq8LZr9qAiKEs3FZKLXaBNcoWsW73TV4o2JEotS6pahqD1tz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Warfare Experts Join Forces to Protect You]]></title><description><![CDATA[Today’s battlefield is a digital one. Cyber warriors who work with international law enforcement agencies, corporations, colleges and universities and non-profits fight with Russia, North Korea, Iran,]]></description><link>http://direct.ecency.com/bugheist/@bugheist/cyber-warfare-experts-join-forces-to-protect-you</link><guid isPermaLink="true">http://direct.ecency.com/bugheist/@bugheist/cyber-warfare-experts-join-forces-to-protect-you</guid><category><![CDATA[bugheist]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Mon, 23 Apr 2018 17:13:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/AmRc67RgYaWVEa5TxnoPRiGMS1Ae6MyfiK8oyuudr8zBEGBm53ZrfFdcFvDY5TPJbvSY3FsJ2M73q8nZZ5LVf35jLgz7DEMF1XcfRizMD3JntWdB2NnkKDuYzJWGBNgiCugDCsyHnEc8NKguzHePMui564ZudP6E?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your Guide to Secure Software Development Practices, Products & Projects]]></title><description><![CDATA[Credit: Atif Arshad, The Noun Project March 27, 2018 Dear Steemians: Some of us might remember a time when we hid out at our friends’ houses or the local pizzeria where we could get a slice and a Coke]]></description><link>http://direct.ecency.com/bugheist/@bugheist/7eblky-your-guide-to-secure-software-development-practices-products-and-projects</link><guid isPermaLink="true">http://direct.ecency.com/bugheist/@bugheist/7eblky-your-guide-to-secure-software-development-practices-products-and-projects</guid><category><![CDATA[bugheist]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Tue, 27 Mar 2018 17:39:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pQYiuVvgYiUBP16WHGGN7UNn1BCdGdMmXqMhFVs8ShRuXrRMuLwuTSDBVVCJ76kfD5ZkRdvAJYiAaoLct2v5NYHsBKPcZeSo831Lca4nLtEpc6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your Guide to Secure Software Development Practices, Products & Projects]]></title><description><![CDATA[Credit: Atif Arshad, The Noun Project March 7, 2018 Dear Steemians: Like you, Sean and I are reading the stories about how our U.S. election data might have been accessed by the Russian government and]]></description><link>http://direct.ecency.com/cybersecurity/@bugheist/sjiic-your-guide-to-secure-software-development-practices-products-and-projects</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@bugheist/sjiic-your-guide-to-secure-software-development-practices-products-and-projects</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[bugheist]]></dc:creator><pubDate>Wed, 07 Mar 2018 14:00:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJb4ARrxQxCjX4jizub4U5CAK3WwB89qxssPEf9oTi9dtehMogWhvuDyNAYxtx2DKKPE3cVJni1n4TmmAdYi3d9EFesveWMpUHuT9CUMmx?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>