<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 16:03:55 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/icit/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Can Artificial Intelligence cure the Ransomware pandemic on Healthcare?]]></title><description><![CDATA[ A new report from the Institute of Critical Infrastructure Technology considers the possibility that artificial intelligence might be the cure for the security ills of the healthcare industry ]]></description><link>http://direct.ecency.com/icit/@jonsmith/can-artificial-intelligence-cure-the-ransomware-pandemic-on-healthcare</link><guid isPermaLink="true">http://direct.ecency.com/icit/@jonsmith/can-artificial-intelligence-cure-the-ransomware-pandemic-on-healthcare</guid><category><![CDATA[icit]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 15 Mar 2017 23:05:24 GMT</pubDate></item><item><title><![CDATA[ICIT Briefing - Artificial Intelligence & Machine Learning: Cybersecurity's Paradigm Shift]]></title><description><![CDATA[  ICIT is pleased to host this briefing in support of its current initiative on artificial intelligence and non-signature based technologies to protect our critical infrastructures.  During this]]></description><link>http://direct.ecency.com/healthcare/@jonsmith/icit-briefing-artificial-intelligence-and-machine-learning-cybersecurity-s-paradigm-shift</link><guid isPermaLink="true">http://direct.ecency.com/healthcare/@jonsmith/icit-briefing-artificial-intelligence-and-machine-learning-cybersecurity-s-paradigm-shift</guid><category><![CDATA[healthcare]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Mon, 13 Mar 2017 23:49:00 GMT</pubDate></item><item><title><![CDATA[WikiLeaks Dumps CIA Hacking Docs Online]]></title><description><![CDATA[ WikiLeaks on Tuesday dumped thousands of classified documents onto the Internet, exposing hacking programs used by the CIA. The torrent of data is just the first in a series of dumps WikLeaks is]]></description><link>http://direct.ecency.com/cybersecurity/@jonsmith/wikileaks-dumps-cia-hacking-docs-online</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@jonsmith/wikileaks-dumps-cia-hacking-docs-online</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Fri, 10 Mar 2017 01:35:09 GMT</pubDate></item><item><title><![CDATA[How Healthcare Benefits from Cybersecurity Guidelines]]></title><description><![CDATA[Non-profit and non-government organizations do not always implement cybersecurity guidelines, according to a recent ICIT survey. Healthcare entities have several key cybersecurity frameworks to utilize]]></description><link>http://direct.ecency.com/healthcare/@jonsmith/4hxqww-how-healthcare-benefits-from-cybersecurity-guidelines</link><guid isPermaLink="true">http://direct.ecency.com/healthcare/@jonsmith/4hxqww-how-healthcare-benefits-from-cybersecurity-guidelines</guid><category><![CDATA[healthcare]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Fri, 10 Mar 2017 01:28:39 GMT</pubDate></item><item><title><![CDATA[Top 10 Quotes About The Internet of Things]]></title><description><![CDATA[  “Security by design is a mandatory prerequisite to securing the IoT macrocosm, the Dyn attack was just a practice run.” - James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology]]></description><link>http://direct.ecency.com/technology/@jonsmith/top-10-quotes-about-the-internet-of-things</link><guid isPermaLink="true">http://direct.ecency.com/technology/@jonsmith/top-10-quotes-about-the-internet-of-things</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Fri, 10 Mar 2017 01:11:03 GMT</pubDate></item><item><title><![CDATA[How Healthcare Benefits from Cybersecurity Guidelines]]></title><description><![CDATA[Non-profit and non-government organizations do not always implement cybersecurity guidelines, according to a recent ICIT survey.  How Healthcare Benefits from Cybersecurity Guidelines.on-profit and]]></description><link>http://direct.ecency.com/cybersecurity/@jonsmith/how-healthcare-benefits-from-cybersecurity-guidelines</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@jonsmith/how-healthcare-benefits-from-cybersecurity-guidelines</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 08 Mar 2017 21:12:06 GMT</pubDate></item></channel></rss>