<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 14:56:53 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cyberdefense/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Hive et le pouvoir secret [Do Ré Mi Fa Si Sol La] pourquoi [hiveembassy]]]></title><description><![CDATA[Hello moi c'est Jean, mais tu peux m'appeler Rajiv. Parmis d'autres activités, je suis job coach. Depuis 20 ans, j'ai testé plus de plateformes que je ne pensais pouvoir exister. Je les ai testé jusqu'au]]></description><link>http://direct.ecency.com/laruche/@jnmarteau/hive-et-le-pouvoir-secret-do-re-mi-fa-si-sol-la-pourquoi-hiveembassy</link><guid isPermaLink="true">http://direct.ecency.com/laruche/@jnmarteau/hive-et-le-pouvoir-secret-do-re-mi-fa-si-sol-la-pourquoi-hiveembassy</guid><category><![CDATA[laruche]]></category><dc:creator><![CDATA[jnmarteau]]></dc:creator><pubDate>Tue, 21 Mar 2023 20:18:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gKjXsrozapsD83FxL3Xbyyi5LFttAhrXxr16mCe4arfLHWcqeiqjWxvE7yGgMQDKcEaFzTDFiYeGp7YJj1b3J8EfC681vpJCtqgSD68tXVJER4DzAqPGW9451BJpYpdZMzCWE3uVaot47tgvToKxEMVw7dXibBL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity for Cryptocurrencies: Top Tips to Get You Going]]></title><description><![CDATA[Image from Pixabay.com Cryptocurrencies are a more secure way of transacting money but the anonymity behind their protocols has made it a hotbed for hackers and scammers. Most of the coins on the crypto]]></description><link>http://direct.ecency.com/blockchain/@stellarlibrarian/cybersecurityforcryptocurrenciestoptipstogetyougoing-pmdqw3iuruh1giajdisy</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@stellarlibrarian/cybersecurityforcryptocurrenciestoptipstogetyougoing-pmdqw3iuruh1giajdisy</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 02 Nov 2020 22:07:03 GMT</pubDate></item><item><title><![CDATA[4 Reasons Cyber Security is a Key Concern for Everyone]]></title><description><![CDATA[You’ll agree with me that the internet plays a crucial role in the lives of many people. It has become so powerful that it somehow impacts those who do not use it at all. Mailing, shopping, communicating,]]></description><link>http://direct.ecency.com/cyberdefense/@stellarlibrarian/4reasonscybersecurityisakeyconcernforeveryone-a5w0kzgods2m754jpxj7</link><guid isPermaLink="true">http://direct.ecency.com/cyberdefense/@stellarlibrarian/4reasonscybersecurityisakeyconcernforeveryone-a5w0kzgods2m754jpxj7</guid><category><![CDATA[cyberdefense]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 19 Oct 2020 17:21:45 GMT</pubDate></item><item><title><![CDATA[Cloud Security Basics]]></title><description><![CDATA[Cloud security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and foundation. These security measures are designed]]></description><link>http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecuritybasics-4qzdfshtsr</link><guid isPermaLink="true">http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecuritybasics-4qzdfshtsr</guid><category><![CDATA[cloud]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Tue, 08 Sep 2020 10:21:39 GMT</pubDate></item><item><title><![CDATA[Protect your crypto accounts from attackers]]></title><description><![CDATA[With cryptocurrencies, there is no centralized authority responsible for the security of your funds, while the dangers are abundant. Your wallet can be hacked, and your PC can be captured by a virus designed]]></description><link>http://direct.ecency.com/blockchain/@stellarlibrarian/protectyourcryptoaccountsfromattackers-t5yqo8k3mm</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@stellarlibrarian/protectyourcryptoaccountsfromattackers-t5yqo8k3mm</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 18 May 2020 09:36:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUMmsnBu1CsYA4ENxnKU6Re1q6rYNVkzGNipX6eA1aRAqAN5XWqqn2DKC2PCm6CvaHbKrmc4BCYzJ9cZrT6gCXwTnW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cloud security]]></title><description><![CDATA[Cloud security, otherwise called cloud processing security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and]]></description><link>http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecurity-ulmhsbdskv</link><guid isPermaLink="true">http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecurity-ulmhsbdskv</guid><category><![CDATA[cloud]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 20 Apr 2020 08:39:27 GMT</pubDate></item><item><title><![CDATA[Intrusion Detection (IDS)]]></title><description><![CDATA[IDS is a system that monitors network traffic for suspicious action and alerts you when such advancement is perceived. This is a thing application that scans your network or system for harmful exercises]]></description><link>http://direct.ecency.com/cyber/@stellarlibrarian/intrusiondetectionids-rum1odb4mi</link><guid isPermaLink="true">http://direct.ecency.com/cyber/@stellarlibrarian/intrusiondetectionids-rum1odb4mi</guid><category><![CDATA[cyber]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 06 Apr 2020 19:42:39 GMT</pubDate></item><item><title><![CDATA[4 Reasons Cybersecurity is a Key Concern for Everyone]]></title><description><![CDATA[You’ll agree with me that the internet plays a crucial role in the lives of many people. It has become so powerful that it somehow impacts those who do not use it at all. Mailing, shopping, communicating,]]></description><link>http://direct.ecency.com/cyberdefense/@stellarlibrarian/4reasonscybersecurityisakeyconcernforeveryone-muvksj494f</link><guid isPermaLink="true">http://direct.ecency.com/cyberdefense/@stellarlibrarian/4reasonscybersecurityisakeyconcernforeveryone-muvksj494f</guid><category><![CDATA[cyberdefense]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Wed, 25 Mar 2020 09:07:06 GMT</pubDate></item><item><title><![CDATA[Is your data secure?]]></title><description><![CDATA[Hell no, your personal information is freely accessible. If you use Facebook, Twitter, most email services, register your car or have your name in the Census, it is a fair bet that your information with]]></description><link>http://direct.ecency.com/cyberdefense/@stellarlibrarian/isyourdatasecure-ctypglhcfh</link><guid isPermaLink="true">http://direct.ecency.com/cyberdefense/@stellarlibrarian/isyourdatasecure-ctypglhcfh</guid><category><![CDATA[cyberdefense]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Tue, 25 Feb 2020 10:23:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUMmsnBu1CsYA4ENxnKU6Re1q6rYNVkzGNipX6eA1aRAqAN5XWqqn2DKC2PCm6CvaHbKreSev2e7BnUYGW6tGL9it6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Publications on Cybersecurity by Lars Hilse]]></title><description><![CDATA[Threat Assessment: BitcoinDanger to the United States' National Security and her Economic and Commercial Interests ISBN 978-1-489-52959-6 SHUT UP! And get a profitable Social Media Policy $14.3 million]]></description><link>http://direct.ecency.com/cybercrime/@larshilse/publications-on-cybersecurity-by-lars-hilse</link><guid isPermaLink="true">http://direct.ecency.com/cybercrime/@larshilse/publications-on-cybersecurity-by-lars-hilse</guid><category><![CDATA[cybercrime]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Thu, 06 Feb 2020 07:07:21 GMT</pubDate></item><item><title><![CDATA[Cybersecurity 101 - For those who don't care]]></title><description><![CDATA[Online Accounts Are ALWAYS Under Attack! Yes, Mr/Mrs/other 1 in 7.7 Billion, you. It is absurd how easy it is to go on Google, find a forum, and locate trillions of records full of personal emails, passwords,]]></description><link>http://direct.ecency.com/cyber/@stellarlibrarian/cybersecurity101-forthosewhodontcare-2pepcpt7nj</link><guid isPermaLink="true">http://direct.ecency.com/cyber/@stellarlibrarian/cybersecurity101-forthosewhodontcare-2pepcpt7nj</guid><category><![CDATA[cyber]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Tue, 07 Jan 2020 08:34:36 GMT</pubDate></item><item><title><![CDATA[La mutation de la cybersécurité engendrée par le développement de l'IA : nouveaux risques et solutions apportées]]></title><description><![CDATA[Avant-propos : Le terme « hacker » ayant une définition relativement incomplète ou erronée aux yeux du grand public, nous tenions à rappeler qu’originellement « hacker » provient du verbe anglais « hacking]]></description><link>http://direct.ecency.com/fr/@cyb-ri/la-mutation-de-la-cybersecurite-engendre-par-le-developpement-de-l-ia-nouveaux-risques-et-solutions-apportees</link><guid isPermaLink="true">http://direct.ecency.com/fr/@cyb-ri/la-mutation-de-la-cybersecurite-engendre-par-le-developpement-de-l-ia-nouveaux-risques-et-solutions-apportees</guid><category><![CDATA[fr]]></category><dc:creator><![CDATA[cyb-ri]]></dc:creator><pubDate>Thu, 10 Oct 2019 05:59:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQGUoG2S1K5ZbsdMsJwjy2VEPfnBid2VzN1eU9DeDeWWWeirkG5rKynzTWfU1CDUb3jGXr21WjY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to become a CyberSecurity Expert]]></title><description><![CDATA[Security Specialist is a catchall description for a wide variety of entry- to intermediate-level IT security jobs. In the majority of cases, you will be responsible for designing, testing, implementing]]></description><link>http://direct.ecency.com/cybersecurity/@youssef1099/how-to-become-a-cybersecurity-expert</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@youssef1099/how-to-become-a-cybersecurity-expert</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[youssef1099]]></dc:creator><pubDate>Wed, 25 Sep 2019 23:29:03 GMT</pubDate></item><item><title><![CDATA[Réserve citoyenne de cyberdéfense : S'engager !]]></title><description><![CDATA[Bonjour à tous ! Cette semaine avait lieu un challenge technique de type CTF (Capture the flag) organisé par la DGA à l'école de transmission (ETRS) de Rennes et ouvert aux réservistes de cyberdéfense.]]></description><link>http://direct.ecency.com/cyberdefense/@nybble/reserve-citoyenne-de-cyberdefense-s-engager</link><guid isPermaLink="true">http://direct.ecency.com/cyberdefense/@nybble/reserve-citoyenne-de-cyberdefense-s-engager</guid><category><![CDATA[cyberdefense]]></category><dc:creator><![CDATA[nybble]]></dc:creator><pubDate>Fri, 02 Jun 2017 09:30:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWPGGUiZ9pqnZoj8JHYxCCp9dtn2QVefzG2YriWmx767zCr4Q5PLDL65YRPspKjAPDyhZ9vKSCX5FrqBo2HC3UaLsEYwmjNkmHkPiV2NJPhg?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>