<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 15 Great Security Blogs to Check Out!</title>
	<atom:link href="http://www.gfi.com/blog/15-great-security-blogs-to-check-out/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=15-great-security-blogs-to-check-out</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Abhay Mittal</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31891</link>
		<dc:creator>Abhay Mittal</dc:creator>
		<pubDate>Fri, 16 Mar 2012 11:21:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31891</guid>
		<description><![CDATA[There is one major improvement:
How can you forget the most most trusted CNET download.com security blog?]]></description>
		<content:encoded><![CDATA[<p>There is one major improvement:<br />
How can you forget the most most trusted CNET download.com security blog?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Abhay Mittal</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31890</link>
		<dc:creator>Abhay Mittal</dc:creator>
		<pubDate>Fri, 16 Mar 2012 11:18:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31890</guid>
		<description><![CDATA[The post is great and I know that it can be written only after research. But, the biggest mistake:
You&#039;ve left the name of the security blog of CNET download.com?]]></description>
		<content:encoded><![CDATA[<p>The post is great and I know that it can be written only after research. But, the biggest mistake:<br />
You&#8217;ve left the name of the security blog of CNET download.com?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: J. Paul</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31570</link>
		<dc:creator>J. Paul</dc:creator>
		<pubDate>Sat, 18 Feb 2012 12:14:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31570</guid>
		<description><![CDATA[Nice list. I must admit I haven&#039;t heard about most of them. May I add Mark Russinovich&#039;s blog to the list? http://blogs.technet.com/b/markrussinovich/. It&#039;s not strictly security and it isn&#039;t frequently updated but for Windows security, it is a great source.]]></description>
		<content:encoded><![CDATA[<p>Nice list. I must admit I haven&#8217;t heard about most of them. May I add Mark Russinovich&#8217;s blog to the list? <a href="http://blogs.technet.com/b/markrussinovich/" rel="nofollow">http://blogs.technet.com/b/markrussinovich/</a>. It&#8217;s not strictly security and it isn&#8217;t frequently updated but for Windows security, it is a great source.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alan Shimel</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31465</link>
		<dc:creator>Alan Shimel</dc:creator>
		<pubDate>Sat, 11 Feb 2012 03:00:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31465</guid>
		<description><![CDATA[Guys thanks for the kind words and mention.  For the record my name is spelled Shimel. It probably should be Schimel, but they must have messed it up when my family came to this country.  I would also mention that most all of these blogs and 300+ other great security blogs are available via the feed for the Security Bloggers Network!]]></description>
		<content:encoded><![CDATA[<p>Guys thanks for the kind words and mention.  For the record my name is spelled Shimel. It probably should be Schimel, but they must have messed it up when my family came to this country.  I would also mention that most all of these blogs and 300+ other great security blogs are available via the feed for the Security Bloggers Network!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Christina Goggi</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31453</link>
		<dc:creator>Christina Goggi</dc:creator>
		<pubDate>Thu, 09 Feb 2012 15:27:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31453</guid>
		<description><![CDATA[Thanks to all for the feedback!

@Neil Roiter - thanks! Updated it now.]]></description>
		<content:encoded><![CDATA[<p>Thanks to all for the feedback!</p>
<p>@Neil Roiter &#8211; thanks! Updated it now.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Neil Roiter</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31452</link>
		<dc:creator>Neil Roiter</dc:creator>
		<pubDate>Thu, 09 Feb 2012 14:47:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31452</guid>
		<description><![CDATA[Thanks for the very helpful post. I found and now subscribe to several that are new to me.

BTW, for ashimmy. Alan&#039;s name is Schimel.]]></description>
		<content:encoded><![CDATA[<p>Thanks for the very helpful post. I found and now subscribe to several that are new to me.</p>
<p>BTW, for ashimmy. Alan&#8217;s name is Schimel.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Eyal Estrin</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31451</link>
		<dc:creator>Eyal Estrin</dc:creator>
		<pubDate>Thu, 09 Feb 2012 14:31:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31451</guid>
		<description><![CDATA[Check out Security 24/7 on http://security-24-7.com]]></description>
		<content:encoded><![CDATA[<p>Check out Security 24/7 on <a href="http://security-24-7.com" rel="nofollow">http://security-24-7.com</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sebastian Hughs</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31441</link>
		<dc:creator>Sebastian Hughs</dc:creator>
		<pubDate>Thu, 09 Feb 2012 05:51:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31441</guid>
		<description><![CDATA[Thank you for this post Christina. I&#039;ve been searching for new security blogs for quite some time now.

I&#039;ve been following and reading KrebsonSecurity for two years now and all I can say is that it&#039;s one of the most comprehensive when it comes to botnets and spams. It&#039;s a an excellent resource - full of informative articles and tips.

Since I&#039;m from Washington, I&#039;ve also read some of Brian Kreb&#039;s articles from The Washington Post.]]></description>
		<content:encoded><![CDATA[<p>Thank you for this post Christina. I&#8217;ve been searching for new security blogs for quite some time now.</p>
<p>I&#8217;ve been following and reading KrebsonSecurity for two years now and all I can say is that it&#8217;s one of the most comprehensive when it comes to botnets and spams. It&#8217;s a an excellent resource &#8211; full of informative articles and tips.</p>
<p>Since I&#8217;m from Washington, I&#8217;ve also read some of Brian Kreb&#8217;s articles from The Washington Post.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Brian Calnare</title>
		<link>http://www.gfi.com/blog/15-great-security-blogs-to-check-out/comment-page-1/#comment-31413</link>
		<dc:creator>Brian Calnare</dc:creator>
		<pubDate>Wed, 08 Feb 2012 11:24:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8107#comment-31413</guid>
		<description><![CDATA[I&#039;m a big fan of Martin McKeay&#039;s Network Security Blog, particularly for the podcasts he provides. It gives me a chance to study up while I&#039;m dealing with rush hour traffic or on the treadmill, when an RSS feed just isn&#039;t handy enough.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m a big fan of Martin McKeay&#8217;s Network Security Blog, particularly for the podcasts he provides. It gives me a chance to study up while I&#8217;m dealing with rush hour traffic or on the treadmill, when an RSS feed just isn&#8217;t handy enough.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:11:56 by W3 Total Cache --