<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - wikigain</title>
	<atom:link href="https://www.wikigain.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wikigain.com/tag/security/</link>
	<description>Learn New Tech Skills</description>
	<lastBuildDate>Sun, 15 Mar 2020 16:59:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.wikigain.com/wp-content/uploads/2019/07/cropped-Wikigain-Favicon-3-32x32.png</url>
	<title>Security Archives - wikigain</title>
	<link>https://www.wikigain.com/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">102506223</site>	<item>
		<title>Information Technology Security (IT security)</title>
		<link>https://www.wikigain.com/information-technology-security-it-security/</link>
					<comments>https://www.wikigain.com/information-technology-security-it-security/#respond</comments>
		
		<dc:creator><![CDATA[Faiz]]></dc:creator>
		<pubDate>Sun, 15 Mar 2020 16:59:50 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Information Technology Security]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.wikigain.com/?p=23675</guid>

					<description><![CDATA[<p>Information technology security, popularly known as cybersecurity, refers to the practice of protecting computer and electronic systems, networks, programs, and devices from malicious attacks, theft, damage, and even unauthorized access. In recent times, the increased dependence of individuals, companies, and even government organizations on the computer and electronic systems in various ramifications of life has [&#8230;]</p>
<p>The post <a href="https://www.wikigain.com/information-technology-security-it-security/">Information Technology Security (IT security)</a> appeared first on <a href="https://www.wikigain.com">wikigain</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wikigain.com/information-technology-security-it-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23675</post-id>	</item>
		<item>
		<title>The Hidden Mystery Behind Security Audits</title>
		<link>https://www.wikigain.com/the-hidden-mystery-behind-security-audits/</link>
					<comments>https://www.wikigain.com/the-hidden-mystery-behind-security-audits/#respond</comments>
		
		<dc:creator><![CDATA[Faiz]]></dc:creator>
		<pubDate>Sun, 15 Mar 2020 16:49:53 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Audit]]></category>
		<guid isPermaLink="false">https://www.wikigain.com/?p=23672</guid>

					<description><![CDATA[<p>Generally, a security audit is a systematic assessment of the system or application of a company information system by evaluating its conformance to the set and established criteria. These audits range from the audit of physical data security to databases security. There&#8217;s also the technical as well as the administrative audit of security. The main [&#8230;]</p>
<p>The post <a href="https://www.wikigain.com/the-hidden-mystery-behind-security-audits/">The Hidden Mystery Behind Security Audits</a> appeared first on <a href="https://www.wikigain.com">wikigain</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wikigain.com/the-hidden-mystery-behind-security-audits/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23672</post-id>	</item>
		<item>
		<title>Password Security Has Evolved, Here’s how your passwords can too</title>
		<link>https://www.wikigain.com/password-security-has-evolved-heres-how-your-passwords-can-too/</link>
					<comments>https://www.wikigain.com/password-security-has-evolved-heres-how-your-passwords-can-too/#respond</comments>
		
		<dc:creator><![CDATA[Faiz]]></dc:creator>
		<pubDate>Fri, 10 Jan 2020 11:07:15 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.wikigain.com/?p=23585</guid>

					<description><![CDATA[<p>Passwords are pretty simple when you come right down to it: You want to keep your information safe, so the only way it can be accessed is by way of a code entered at the right time at the right place. Unfortunately, the age of the Internet has made passwords very much a hot-button topic. [&#8230;]</p>
<p>The post <a href="https://www.wikigain.com/password-security-has-evolved-heres-how-your-passwords-can-too/">Password Security Has Evolved, Here’s how your passwords can too</a> appeared first on <a href="https://www.wikigain.com">wikigain</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wikigain.com/password-security-has-evolved-heres-how-your-passwords-can-too/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23585</post-id>	</item>
	</channel>
</rss>
