<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; IT Security</title>
	<atom:link href="http://www.gfi.com/blog/category/videos/it-security-videos/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Choosing the right patch management software</title>
		<link>http://www.gfi.com/blog/choosing-the-right-patch-management-software/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=choosing-the-right-patch-management-software</link>
		<comments>http://www.gfi.com/blog/choosing-the-right-patch-management-software/#comments</comments>
		<pubDate>Wed, 12 Jun 2013 15:23:13 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Videos]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10558</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=QeDUdg9fWUw A recent Ponemon Institute study estimates it costs businesses $214 per single, compromised record &#8212; so just imagine what it would cost if thousands of records on your system were compromised. Add to that the impact on reputation, lost &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=QeDUdg9fWUw">http://www.youtube.com/watch?v=QeDUdg9fWUw</a></p>
<p>A recent Ponemon Institute study estimates it costs businesses $214 per single, compromised record &#8212; so just imagine what it would cost if thousands of records on your system were compromised.</p>
<p>Add to that the impact on reputation, lost business and potential legal ramifications and it is easy to see the additional value provided by automatic vulnerability scanning.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/choosing-the-right-patch-management-software/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How event monitoring can prevent IT disasters</title>
		<link>http://www.gfi.com/blog/how-event-monitoring-can-prevent-it-disasters/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-event-monitoring-can-prevent-it-disasters</link>
		<comments>http://www.gfi.com/blog/how-event-monitoring-can-prevent-it-disasters/#comments</comments>
		<pubDate>Mon, 25 Jun 2012 09:03:56 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[event management]]></category>
		<category><![CDATA[event monitoring]]></category>
		<category><![CDATA[it disasters]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8871</guid>
		<description><![CDATA[Knowing what&#8217;s going on in your network is the best way to keep it all running smoothly. Being able to spot problems before they happen will make you a legend in the IT room and in the board room! Using &#8230;]]></description>
				<content:encoded><![CDATA[<p>Knowing what&#8217;s going on in your network is the best way to keep it all running smoothly. Being able to spot problems before they happen will make you a legend in the IT room and in the board room!</p>
<p>Using comprehensive system monitoring tools to filter, sort and display the millions of system events is an excellent way to stay on top of a busy network. These tools allow you to quickly assess the state of your network and spot problems or security breaches before or as they happen. By seeing and acting on warning signs, you can prevent them from becoming critical issues.</p>
<p><a href="http://www.youtube.com/watch?v=7beErqkLq-0">http://www.youtube.com/watch?v=7beErqkLq-0</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-event-monitoring-can-prevent-it-disasters/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>PCI DSS: Twelve IT requirements</title>
		<link>http://www.gfi.com/blog/pci-dss-twelve-it-requirements/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=pci-dss-twelve-it-requirements</link>
		<comments>http://www.gfi.com/blog/pci-dss-twelve-it-requirements/#comments</comments>
		<pubDate>Mon, 21 May 2012 14:48:51 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[pci compliance]]></category>
		<category><![CDATA[pci dss]]></category>
		<category><![CDATA[pci dss requirements]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8658</guid>
		<description><![CDATA[The Payment Card Industry Data Security Standards &#8212; or PCI DSS &#8212; cover any organization that directly accepts credit or debit card payments. Learn more about PCI DSS&#8217;s 12 key requirements in this quick overview; together they make up the &#8230;]]></description>
				<content:encoded><![CDATA[<p>The Payment Card Industry Data Security Standards &#8212; or PCI DSS &#8212; cover any organization that directly accepts credit or debit card payments. Learn more about PCI DSS&#8217;s 12 key requirements in this quick overview; together they make up the kind of IT security policy that any company would be wise to implement.</p>
<p><a href="http://www.youtube.com/watch?v=HiN93kp6Dgc" target="_blank">http://www.youtube.com/watch?v=HiN93kp6Dgc</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/pci-dss-twelve-it-requirements/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Why you Need to run a Vulnerability Assessment</title>
		<link>http://www.gfi.com/blog/why-you-need-to-run-a-vulnerability-assessment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-you-need-to-run-a-vulnerability-assessment</link>
		<comments>http://www.gfi.com/blog/why-you-need-to-run-a-vulnerability-assessment/#comments</comments>
		<pubDate>Wed, 11 Apr 2012 15:25:03 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[network vulnerabilities]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8408</guid>
		<description><![CDATA[The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they &#8230;]]></description>
				<content:encoded><![CDATA[<p>The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they are. That’s were a vulnerability assessment comes in – find out more in this video.</p>
<p><a href="http://www.youtube.com/watch?v=EXyl0re1MZs">http://www.youtube.com/watch?v=EXyl0re1MZs</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/why-you-need-to-run-a-vulnerability-assessment/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>How to Dispose of Confidential Data</title>
		<link>http://www.gfi.com/blog/how-to-dispose-of-confidential-data-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-dispose-of-confidential-data-2</link>
		<comments>http://www.gfi.com/blog/how-to-dispose-of-confidential-data-2/#comments</comments>
		<pubDate>Wed, 28 Mar 2012 13:23:27 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[confidential data]]></category>
		<category><![CDATA[data disposal]]></category>
		<category><![CDATA[old hard disks]]></category>
		<category><![CDATA[second hand hard disks]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8347</guid>
		<description><![CDATA[Companies spend lots of money on protecting their networks and yet, one aspect of data security is surprisingly overlooked &#8211; the disposal of old hardware, especially hard disks. Learn how to effectively tackle this issue in this video. http://www.youtube.com/watch?v=Yop3xDWx8ag]]></description>
				<content:encoded><![CDATA[<p>Companies spend lots of money on protecting their networks and yet, one aspect of data security is surprisingly overlooked &#8211; the disposal of old hardware, especially hard disks. Learn how to effectively tackle this issue in this video.</p>
<p><a href="http://www.youtube.com/watch?v=Yop3xDWx8ag">http://www.youtube.com/watch?v=Yop3xDWx8ag</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-to-dispose-of-confidential-data-2/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 21:58:12 by W3 Total Cache --