<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 24 Apr 2026 12:48:09 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/epp/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[EPP vs EDR: What's the Difference and Why You May Need Both]]></title><description><![CDATA[Image by Pete Linforth from Pixabay An endpoint is one end of a communication channel. For example, when one system communicates with another, the point of communication occurs on both endpoints. Endpoints]]></description><link>http://direct.ecency.com/cybersecurity/@giladm/epp-vs-edr-what-s-the-difference-and-why-you-may-need-both</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@giladm/epp-vs-edr-what-s-the-difference-and-why-you-may-need-both</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[giladm]]></dc:creator><pubDate>Thu, 15 Aug 2019 14:05:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxsTkPYAARp78o5cJA1o6Chv9x98TzCFT6v5Hkc2K2DDSoJCkgHo1gRxLQabDMwbLq5rYRh4uPrpMdTJNV2PawwFUbrasWz1a3eRgfwTJjMWLLDrFsT5fZJ44q3gyGjeCUq67Qh16oe6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[6 Best Practices to Up Your Endpoint Protection Game]]></title><description><![CDATA[Image Source: Pixabay Cyberattacks continue to grow in both volume and sophistication. The majority of attacks gain access to an internal network by compromising endpoints that can communicate with and]]></description><link>http://direct.ecency.com/cybersecurity/@ilai/6-best-practices-to-up-your-endpoint-protection-game</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@ilai/6-best-practices-to-up-your-endpoint-protection-game</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[ilai]]></dc:creator><pubDate>Sun, 21 Jul 2019 15:22:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxsTkPYAARp78o5cJA1o6Chv9x98TzCFT6v5G1dpbF6tx9ZiFPCRPahNhmd2XgwvtaUKyzDvdHKhDEbFVrMFWvBwN1S2hfwdC5GB6HunhriVRW6rr9cXT9VaxsKqy3BDYo8NkF1o7U8v?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Domaining terms for Beginners]]></title><description><![CDATA[( Authorization Code Transfer ) A type of domain name transfer used to transfer a domain from one registrar into another. The original owner of the domain will receive a special and unique authorization]]></description><link>http://direct.ecency.com/domain/@afl.cloud/domaining-termsol-for-beginners</link><guid isPermaLink="true">http://direct.ecency.com/domain/@afl.cloud/domaining-termsol-for-beginners</guid><category><![CDATA[domain]]></category><dc:creator><![CDATA[afl.cloud]]></dc:creator><pubDate>Thu, 23 Aug 2018 23:17:45 GMT</pubDate></item><item><title><![CDATA[Firefighter]]></title><description><![CDATA[Being a firefighter, not because of obligation, but because of passion. #FRIEND Steepshot IPFS IOS Android Web]]></description><link>http://direct.ecency.com/steem/@gabz/firefighter-2018-6-4-15-33-29</link><guid isPermaLink="true">http://direct.ecency.com/steem/@gabz/firefighter-2018-6-4-15-33-29</guid><category><![CDATA[steem]]></category><dc:creator><![CDATA[gabz]]></dc:creator><pubDate>Thu, 05 Jul 2018 19:34:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVvr6qfoEFgBir1jy4DeK1wwhDm7oNHzc1b8roaJY8MKhDKh4BGKZcx1qDyqfUxa8jRXcwzib1SDjbmQdssvLapYurCL64EbTFJ6?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>