<?xml version="1.0" encoding="ISO-8859-1"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">




 

<channel>

    
	
      <title>Security News from CRN</title>
	   
    
	
    



      <link>http://www.crn.com/</link>
      <description>News, Analysis and Perspective for VARs and Technology Integrators</description>
      <language>en-us</language>
		<atom:link href="http://www.crn.com/news_feed.htm?type=t" rel="self" type="application/rss+xml" />
			
				
				
				
				
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Adobe Source Code Leak Could Trigger New Dangers, Say Experts]]></title>
						<link>http://www.crn.com/news/security/240162271/adobe-source-code-leak-could-trigger-new-dangers-say-experts.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162271/adobe-source-code-leak-could-trigger-new-dangers-say-experts.htm</guid>
						
						<pubDate>Fri, 04 Oct 2013 17:17:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Hackers can use the source code to hunt for vulnerabilities in widely used Adobe software and create zero-day attacks targeting specific firms or conduct campaigns on a broad scale.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Adobe Addressing Massive Data Breach, Source Code Leak]]></title>
						<link>http://www.crn.com/news/security/240162259/adobe-addressing-massive-data-breach-source-code-leak.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162259/adobe-addressing-massive-data-breach-source-code-leak.htm</guid>
						
						<pubDate>Fri, 04 Oct 2013 10:42:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[A data security breach at Adobe results in the exposure of personal information, including encrypted credit card numbers of 2.9 million people, and the potentially damaging source code lead.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Barracuda Files $100M IPO To Gain Financial Stability, Market Visibility]]></title>
						<link>http://www.crn.com/news/security/240162238/barracuda-files-100m-ipo-to-gain-financial-stability-market-visibility.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162238/barracuda-files-100m-ipo-to-gain-financial-stability-market-visibility.htm</guid>
						
						<pubDate>Thu, 03 Oct 2013 15:48:00 -0400</pubDate>
						<author>Joseph F. Kovar</author>
						<description>
							<![CDATA[Barracuda Networks, the security and storage appliance vendor, this week filed for an IPO, and noted in its filing that its revenue is growing while income is dropping.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Palo Alto Networks Partners See Big Sales Gains For 2014]]></title>
						<link>http://www.crn.com/news/security/240162133/palo-alto-networks-partners-see-big-sales-gains-for-2014.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162133/palo-alto-networks-partners-see-big-sales-gains-for-2014.htm</guid>
						
						<pubDate>Thu, 03 Oct 2013 12:31:00 -0400</pubDate>
						<author>Steven Burke</author>
						<description>
							<![CDATA[Of the 150 top-tier Palo Alto Americas partners attending the company's fourth annual conference this week, 141 have doubled their sales in the past year and see only good times ahead.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Government Shutdown? Obamacare? Here Come The Spammers]]></title>
						<link>http://www.crn.com/news/security/240162198/government-shutdown-obamacare-here-come-the-spammers.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162198/government-shutdown-obamacare-here-come-the-spammers.htm</guid>
						
						<pubDate>Thu, 03 Oct 2013 11:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Spam campaigns use high-profile events to lure victims to sham websites, trying to trick users into giving up their personal information, say experts.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Accuvant Solutions Architect Talks Up McAfee's Free Threat Analysis Tools]]></title>
						<link>http://www.crn.com/news/security/240162196/accuvant-solutions-architect-talks-up-mcafees-free-threat-analysis-tools.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162196/accuvant-solutions-architect-talks-up-mcafees-free-threat-analysis-tools.htm</guid>
						
						<pubDate>Thu, 03 Oct 2013 10:38:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[McAfee's appliances can help bolster an intrusion prevention system and aid threat analysts in detecting and investigating suspicious activity on the network, says a security solution provider architect.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[McAfee Partner Summit: 10 Ways McAfee Executives Engaged Channel Partners]]></title>
						<link>http://www.crn.com/slide-shows/security/240162121/mcafee-partner-summit-10-ways-mcafee-executives-engaged-channel-partners.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240162121/mcafee-partner-summit-10-ways-mcafee-executives-engaged-channel-partners.htm</guid>
						
						<pubDate>Wed, 02 Oct 2013 16:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Partners were given an overview of McAfee's product road map, a review of challenges and achievements over the last year, and the goals expected of partners over the next year, at the 2013 McAfee SecurityAlliance Partner Summit.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[McAfee President On Competition And Changing Perceptions]]></title>
						<link>http://www.crn.com/news/security/240162145/mcafee-president-on-competition-and-changing-perceptions.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162145/mcafee-president-on-competition-and-changing-perceptions.htm</guid>
						
						<pubDate>Wed, 02 Oct 2013 13:36:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[McAfee's Mike DeCesare tells partners which companies keep him up at night and what he's doing to make sure the company is known for more than its antivirus products.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[McAfee Emboldens Channel With 'Hot' Growth Opportunities, New Incentives]]></title>
						<link>http://www.crn.com/news/security/240162101/mcafee-emboldens-channel-with-hot-growth-opportunities-new-incentives.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162101/mcafee-emboldens-channel-with-hot-growth-opportunities-new-incentives.htm</guid>
						
						<pubDate>Tue, 01 Oct 2013 17:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[McAfee channel executives tell partners that certain technology areas are prime for profitable growth, including security information event management, advanced threat detection and next-generation firewalls.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Experian Buys 41st Parameter For Web Fraud Detection]]></title>
						<link>http://www.crn.com/news/security/240162075/experian-buys-41st-parameter-for-web-fraud-detection.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162075/experian-buys-41st-parameter-for-web-fraud-detection.htm</guid>
						
						<pubDate>Tue, 01 Oct 2013 11:35:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Experian's purchase of 41st Parameter is a continuation of the rapid move by larger vendors to invest in technologies that can detect fraud without impacting customers, say analysts.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[New LogRhythm Channel Chief Nancy Reynolds On 'Embracing' Indirect Model]]></title>
						<link>http://www.crn.com/news/security/240162055/new-logrhythm-channel-chief-nancy-reynolds-on-embracing-indirect-model.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162055/new-logrhythm-channel-chief-nancy-reynolds-on-embracing-indirect-model.htm</guid>
						
						<pubDate>Tue, 01 Oct 2013 11:05:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Reynolds says she is talking to partners to determine 'where the shortcomings are and fix them' as LogRhythm hopes to attract solution providers with network security expertise.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Symantec CFO Steps Down]]></title>
						<link>http://www.crn.com/news/security/240162013/symantec-cfo-steps-down.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162013/symantec-cfo-steps-down.htm</guid>
						
						<pubDate>Tue, 01 Oct 2013 10:15:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Symantec's CFO steps down as the company undergoes a complete reorganization of its product portfolio and go-to-market channel strategy.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Palo Alto Picks Up Partner Pace With Worldwide Channel Chief Appointment]]></title>
						<link>http://www.crn.com/news/security/240162008/palo-alto-picks-up-partner-pace-with-worldwide-channel-chief-appointment.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240162008/palo-alto-picks-up-partner-pace-with-worldwide-channel-chief-appointment.htm</guid>
						
						<pubDate>Mon, 30 Sep 2013 19:37:00 -0400</pubDate>
						<author>Steven Burke</author>
						<description>
							<![CDATA[A 15-year channel veteran and former senior vice president of global channels for videoconferencing vendor Polycom is taking the worldwide channel job at fast-growing Palo Alto Networks.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Cloud Concerns: Today, Data Security Should Trump Worker Productivity]]></title>
						<link>http://www.crn.com/news/security/240161908/cloud-concerns-today-data-security-should-trump-worker-productivity.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161908/cloud-concerns-today-data-security-should-trump-worker-productivity.htm</guid>
						
						<pubDate>Mon, 30 Sep 2013 09:40:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[A new Skyhigh Networks study reveals that too many companies are focused on 'yesterday's concerns.' The NSA revelations mean they better get with the times.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[RSA Toolkit Warning: Experts Say Developers Better Shut The Door]]></title>
						<link>http://www.crn.com/news/security/240161935/rsa-toolkit-warning-experts-say-developers-better-shut-the-door.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161935/rsa-toolkit-warning-experts-say-developers-better-shut-the-door.htm</guid>
						
						<pubDate>Mon, 30 Sep 2013 09:20:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Software security expert says the contentious algorithm could have widespread implications for ISVs and businesses that use applications that employ encryption.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[NSA Revelations Rattle The Cloud Market: What Are You Doing To Calm Customers' Fears?]]></title>
						<link>http://www.crn.com/news/security/240161927/nsa-revelations-rattle-the-cloud-market-what-are-you-doing-to-calm-customers-fears.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161927/nsa-revelations-rattle-the-cloud-market-what-are-you-doing-to-calm-customers-fears.htm</guid>
						
						<pubDate>Mon, 30 Sep 2013 09:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Companies are asking more questions about the security of their cloud-based data as the barrage of NSA-related news rains down. For solution providers, being a 'trusted adviser' has never been more important.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[Desk Stop: Top 5 Cloud Services Employees Can't Access]]></title>
						<link>http://www.crn.com/slide-shows/security/240161928/desk-stop-top-5-cloud-services-employees-cant-access.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240161928/desk-stop-top-5-cloud-services-employees-cant-access.htm</guid>
						
						<pubDate>Fri, 27 Sep 2013 17:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Risky business? Maybe, maybe not. Here are the top five services that companies are preventing their employees from accessing, according to a Skyhigh Networks study.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[HIPAA Omnibus Rule Violation Nets Hefty Fines]]></title>
						<link>http://www.crn.com/news/security/240161913/hipaa-omnibus-rule-violation-nets-hefty-fines.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161913/hipaa-omnibus-rule-violation-nets-hefty-fines.htm</guid>
						
						<pubDate>Fri, 27 Sep 2013 16:57:00 -0400</pubDate>
						<author>Kathy Kim</author>
						<description>
							<![CDATA[Compliance and security company Conventus urges healthcare providers and covered entities to be familiar with the new HIPAA Omnibus Rule to avoid fines ranging from $1,000 to $1.5 million.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Cisco, McAfee, Other Firms Addressing NSA-Linked Encryption Algorithm]]></title>
						<link>http://www.crn.com/news/security/240161911/cisco-mcafee-other-firms-addressing-nsa-linked-encryption-algorithm.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161911/cisco-mcafee-other-firms-addressing-nsa-linked-encryption-algorithm.htm</guid>
						
						<pubDate>Fri, 27 Sep 2013 15:33:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Security firms and network device makers that are validated to run a contentious encryption algorithm are addressing customer concerns and considering whether to follow RSA in issuing a formal advisory to customers.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Many Popular WordPress Sites Vulnerable To Attack, Study Finds]]></title>
						<link>http://www.crn.com/news/security/240161891/many-popular-wordpress-sites-vulnerable-to-attack-study-finds.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161891/many-popular-wordpress-sites-vulnerable-to-attack-study-finds.htm</guid>
						
						<pubDate>Fri, 27 Sep 2013 11:10:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[A review of thousands of popular WordPress websites found more than 70 percent of them vulnerable to attack. Website administrators are using outdated and vulnerable versions of the platform, making them easy targets of cybercriminals, according to the study.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[Top 5 Zero-Day Threats Of 2013]]></title>
						<link>http://www.crn.com/slide-shows/security/240161792/top-5-zero-day-threats-of-2013.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240161792/top-5-zero-day-threats-of-2013.htm</guid>
						
						<pubDate>Thu, 26 Sep 2013 16:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[HP Fires Solution Provider The Experts Following Navy Yard Shooting]]></title>
						<link>http://www.crn.com/news/security/240161821/hp-fires-solution-provider-the-experts-following-navy-yard-shooting.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161821/hp-fires-solution-provider-the-experts-following-navy-yard-shooting.htm</guid>
						
						<pubDate>Thu, 26 Sep 2013 11:45:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[In a letter to The Experts, HP says it has lost confidence in the solution provider's ability to carry out its contract with the Navy.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[New Kaspersky Research: Just Call Them 'Cybermercenaries']]></title>
						<link>http://www.crn.com/news/security/240161857/new-kaspersky-research-just-call-them-cybermercenaries.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161857/new-kaspersky-research-just-call-them-cybermercenaries.htm</guid>
						
						<pubDate>Thu, 26 Sep 2013 10:10:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Latest Kaspersky analysis finds hit-and-run attacks targeting government contractors, shipbuilding groups, telecom operators and high-tech manufacturers in Japan and South Korea.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[IBM's X-Force Team: Attackers Take Path Of Least Resistance]]></title>
						<link>http://www.crn.com/news/security/240161761/ibms-x-force-team-attackers-take-path-of-least-resistance.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161761/ibms-x-force-team-attackers-take-path-of-least-resistance.htm</guid>
						
						<pubDate>Wed, 25 Sep 2013 10:30:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Targeted attack campaigns are using tried-and-true hacking techniques, including SQL injection, cross-site scripting and more, says a new report from IBM's X-Force Team.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[F-Secure: Phishing Campaigns Using Real Estate, Tax Agencies As Bait]]></title>
						<link>http://www.crn.com/news/security/240161706/f-secure-phishing-campaigns-using-real-estate-tax-agencies-as-bait.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161706/f-secure-phishing-campaigns-using-real-estate-tax-agencies-as-bait.htm</guid>
						
						<pubDate>Tue, 24 Sep 2013 10:05:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Automated toolkits are helping cybercriminals craft socially engineered messages that are easily tricking victims into visiting an attack website.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[5 Reasons FireEye Antimalware Technology Is Overvalued By Wall Street]]></title>
						<link>http://www.crn.com/slide-shows/security/240161680/5-reasons-fireeye-antimalware-technology-is-overvalued-by-wall-street.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240161680/5-reasons-fireeye-antimalware-technology-is-overvalued-by-wall-street.htm</guid>
						
						<pubDate>Tue, 24 Sep 2013 10:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[FireEye is one of the hottest appliance makers in the security industry, but other security vendors are reproducing its antimalware technology and the value of the protection it provides is unproven, experts tell CRN.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Microsoft Zero-Day Attacks Tied To Group Responsible For Bit9 Breach]]></title>
						<link>http://www.crn.com/news/security/240161629/microsoft-zero-day-attacks-tied-to-group-responsible-for-bit9-breach.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161629/microsoft-zero-day-attacks-tied-to-group-responsible-for-bit9-breach.htm</guid>
						
						<pubDate>Mon, 23 Sep 2013 11:15:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[An ongoing attack campaign is targeting organizations in Japan, according to new research from FireEye that ties cybercriminals responsible for the latest attacks to the high-profile data breach at Bit9.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[RSA Tells Developers To Ditch Contentious Encryption Algorithm]]></title>
						<link>http://www.crn.com/news/security/240161598/rsa-tells-developers-to-ditch-contentious-encryption-algorithm.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161598/rsa-tells-developers-to-ditch-contentious-encryption-algorithm.htm</guid>
						
						<pubDate>Fri, 20 Sep 2013 11:40:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[An encryption algorithm that may contain a back door for government surveillance was set as the default configuration in RSA's encryption implementation toolkit for developers.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[5 Ways To Avoid An Epic Facebook Fail]]></title>
						<link>http://www.crn.com/slide-shows/security/240161547/5-ways-to-avoid-an-epic-facebook-fail.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240161547/5-ways-to-avoid-an-epic-facebook-fail.htm</guid>
						
						<pubDate>Thu, 19 Sep 2013 15:27:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Montana Lt. Governor John Walsh, who is running for the state's U.S. Senate seat, faced scrutiny this week for 'liking' a Facebook page that features pictures of women's breasts.  The rogue 'like' was called an honest mistake, but it could be costly to his campaign. Learn how to avoid reputation-damaging mistakes.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[EMC Plans Layoffs at RSA Security Division]]></title>
						<link>http://www.crn.com/news/security/240161513/emc-plans-layoffs-at-rsa-security-division.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240161513/emc-plans-layoffs-at-rsa-security-division.htm</guid>
						
						<pubDate>Thu, 19 Sep 2013 10:43:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Sales of RSA's SecurID hardware tokens have slowly declined in recent years, but the company has been building out its adaptive authentication strategy and is moving into other security areas, analysts say.]]>
						</description>
					
						</item>
						
					
				
			
</channel>
</rss>