<?xml version="1.0" encoding="ISO-8859-1"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">




 

<channel>

    
	
      <title>Security News from CRN</title>
	   
    
	
    



      <link>http://www.crn.com/</link>
      <description>News, Analysis and Perspective for VARs and Technology Integrators</description>
      <language>en-us</language>
		<atom:link href="http://www.crn.com/news_feed.htm?type=t" rel="self" type="application/rss+xml" />
			
				
				
				
				
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Bradford Networks, Brocade Join Forces To Take On BYOD]]></title>
						<link>http://www.crn.com/news/security/240154323/bradford-networks-brocade-join-forces-to-take-on-byod.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154323/bradford-networks-brocade-join-forces-to-take-on-byod.htm</guid>
						
						<pubDate>Tue, 07 May 2013 11:34:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Under a new partnership, Bradford Networks is integrating its network access control Network Sentry software with Brocade's new HyperEdge Architecture.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Microsoft Acknowledges Internet Explorer Zero-Day Used In Website Attack]]></title>
						<link>http://www.crn.com/news/security/240154256/microsoft-acknowledges-internet-explorer-zero-day-used-in-website-attack.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154256/microsoft-acknowledges-internet-explorer-zero-day-used-in-website-attack.htm</guid>
						
						<pubDate>Mon, 06 May 2013 14:57:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Visitors to the Department of Labor's nuclear-related content were targeted with a Microsoft zero-day vulnerability.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[McAfee Acquires Stonesoft For Enterprise Firewall Capabilities]]></title>
						<link>http://www.crn.com/news/security/240154207/mcafee-acquires-stonesoft-for-enterprise-firewall-capabilities.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154207/mcafee-acquires-stonesoft-for-enterprise-firewall-capabilities.htm</guid>
						
						<pubDate>Mon, 06 May 2013 10:18:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[McAfee says its Stonesoft buy will add next-gen firewall capabilities and an advanced malware detection engine to its intrusion prevention and firewall product lines.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Chinese Attackers Infiltrate Defense Contractor, Steal Sensitive Military Technology]]></title>
						<link>http://www.crn.com/news/security/240154111/chinese-attackers-infiltrate-defense-contractor-steal-sensitive-military-technology.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154111/chinese-attackers-infiltrate-defense-contractor-steal-sensitive-military-technology.htm</guid>
						
						<pubDate>Fri, 03 May 2013 12:14:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[The QinetiQ attackers were persistent, remaining on the systems at one point for 251 days, accessing more than 150 computers and stealing 20 GB of data before they were detected, according to reports.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[WordPress Bloggers Beware: You're Easy Pickings For Cybercriminals]]></title>
						<link>http://www.crn.com/news/security/240154139/wordpress-bloggers-beware-youre-easy-pickings-for-cybercriminals.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154139/wordpress-bloggers-beware-youre-easy-pickings-for-cybercriminals.htm</guid>
						
						<pubDate>Fri, 03 May 2013 10:30:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Dell-SecureWorks researchers explain the dangers of failing to apply the latest patches to the WordPress platform and third-party components.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[The Top 5 Causes Of Corporate Data Breaches (Video)]]></title>
						<link>http://www.crn.com/news/security/240154122/the-top-5-causes-of-corporate-data-breaches-video.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154122/the-top-5-causes-of-corporate-data-breaches-video.htm</guid>
						
						<pubDate>Thu, 02 May 2013 14:30:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Verizon's new security report explains how businesses can avoid and minimize the risk of major data breaches.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[5 Ways To Avoid A Stolen Password Pitfall]]></title>
						<link>http://www.crn.com/slide-shows/security/240154095/5-ways-to-avoid-a-stolen-password-pitfall.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240154095/5-ways-to-avoid-a-stolen-password-pitfall.htm</guid>
						
						<pubDate>Thu, 02 May 2013 13:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[WhiteHat: Almost All Websites Have One Serious Coding Error]]></title>
						<link>http://www.crn.com/news/security/240154085/whitehat-almost-all-websites-have-one-serious-coding-error.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154085/whitehat-almost-all-websites-have-one-serious-coding-error.htm</guid>
						
						<pubDate>Thu, 02 May 2013 12:22:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[WhiteHat's latest report analyzes data from websites at more than 650 organizations that are monitored by the firm's Sentinel application security platform.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Breach Stats Prompt Need For Vulnerability, Configuration Assessment: Report]]></title>
						<link>http://www.crn.com/news/security/240154027/breach-stats-prompt-need-for-vulnerability-configuration-assessment-report.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154027/breach-stats-prompt-need-for-vulnerability-configuration-assessment-report.htm</guid>
						
						<pubDate>Wed, 01 May 2013 19:40:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Enterprises need to focus on vulnerability and configuration weaknesses that are consistently being targeted by attackers, according to security experts.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Digital Privacy Watchdog Calls Out Apple, AT&T, Verizon]]></title>
						<link>http://www.crn.com/news/security/240154002/digital-privacy-watchdog-calls-out-apple-at-t-verizon.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240154002/digital-privacy-watchdog-calls-out-apple-at-t-verizon.htm</guid>
						
						<pubDate>Wed, 01 May 2013 11:25:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[A new report by the Electronic Frontier Foundation gives out some low grades to companies for a lack transparency and potentially freely give up user information to the government.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[5 Phishing Attack Trends You May Have Missed]]></title>
						<link>http://www.crn.com/slide-shows/security/240153726/5-phishing-attack-trends-you-may-have-missed.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240153726/5-phishing-attack-trends-you-may-have-missed.htm</guid>
						
						<pubDate>Tue, 30 Apr 2013 16:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Microsoft, Trend Micro Identify Surge in PDF Attacks]]></title>
						<link>http://www.crn.com/news/security/240153923/microsoft-trend-micro-identify-surge-in-pdf-attacks.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153923/microsoft-trend-micro-identify-surge-in-pdf-attacks.htm</guid>
						
						<pubDate>Tue, 30 Apr 2013 14:05:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[The increase in document attacks stem from the popular Black Hole automated attack toolkit, which is targeting flaws patched as long as five years ago. Some targeted campaigns are exploiting older flaws as well.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[New Amazon Blog Tackles Web Services Security Concerns]]></title>
						<link>http://www.crn.com/news/security/240153887/new-amazon-blog-tackles-web-services-security-concerns.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153887/new-amazon-blog-tackles-web-services-security-concerns.htm</guid>
						
						<pubDate>Tue, 30 Apr 2013 11:38:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Amazon Web Services' security has been under scrutiny after a new study finds the complexity of managing Amazon S3 opens up security weaknesses that potentially expose confidential data.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Dutch Officials Nab Suspect In Spamhaus DDoS Attacks]]></title>
						<link>http://www.crn.com/news/security/240153895/dutch-officials-nab-suspect-in-spamhaus-ddos-attacks.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153895/dutch-officials-nab-suspect-in-spamhaus-ddos-attacks.htm</guid>
						
						<pubDate>Tue, 30 Apr 2013 10:09:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Authorities arrest a man in Spain and seize computers, data carriers and mobile phones they say were connected with the March attacks on the antispam blacklisting service Spamhaus.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[DDoS Attacks Behind Unauthorized Wire Transfers, ACH Fraud: Report]]></title>
						<link>http://www.crn.com/news/security/240153842/ddos-attacks-behind-unauthorized-wire-transfers-ach-fraud-report.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153842/ddos-attacks-behind-unauthorized-wire-transfers-ach-fraud-report.htm</guid>
						
						<pubDate>Mon, 29 Apr 2013 17:47:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Security researchers at Dell SecureWorks have found that short-lived DDoS attacks against banks could be a precursor to an unauthorized wire transfer.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Adobe PDF Zero-Day Flaw Enables Location Tracking]]></title>
						<link>http://www.crn.com/news/security/240153821/adobe-pdf-zero-day-flaw-enables-location-tracking.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153821/adobe-pdf-zero-day-flaw-enables-location-tracking.htm</guid>
						
						<pubDate>Mon, 29 Apr 2013 15:26:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[A zero-day flaw that impacts all versions of Adobe Reader enables the sender of a .PDF file to track when and where the file is opened.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[LivingSocial Data Breach Affects Millions]]></title>
						<link>http://www.crn.com/news/security/240153803/livingsocial-data-breach-affects-millions.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153803/livingsocial-data-breach-affects-millions.htm</guid>
						
						<pubDate>Mon, 29 Apr 2013 10:05:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[LivingSocial, which localizes daily deals, events, restaurant listings and merchandise, revealed a data security breach late Friday, informing at least 50 million users that some customer data was accessed.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Adobe Taps Senior Director For Newly Created CSO Role]]></title>
						<link>http://www.crn.com/news/security/240153685/adobe-taps-senior-director-for-newly-created-cso-role.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153685/adobe-taps-senior-director-for-newly-created-cso-role.htm</guid>
						
						<pubDate>Thu, 25 Apr 2013 19:43:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Brad Arkin, who has overseen the company's product security and incident response initiatives, was named to the newly created position of chief security officer.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[New Sophos Americas Chief Examining Partner Lead Gen Concerns]]></title>
						<link>http://www.crn.com/news/security/240153676/new-sophos-americas-chief-examining-partner-lead-gen-concerns.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153676/new-sophos-americas-chief-examining-partner-lead-gen-concerns.htm</guid>
						
						<pubDate>Thu, 25 Apr 2013 16:18:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Former Astaro business partners are seeing the well of sales leads dry up, indicating Sophos could be focusing on other parts of its business.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[CA Acquires Layer 7 To Bolster Cloud, Mobile Security Strategy]]></title>
						<link>http://www.crn.com/news/security/240153570/ca-acquires-layer-7-to-bolster-cloud-mobile-security-strategy.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153570/ca-acquires-layer-7-to-bolster-cloud-mobile-security-strategy.htm</guid>
						
						<pubDate>Wed, 24 Apr 2013 16:02:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Layer 7 Technologies will be integrated into CA's access management and Web application delivery portfolio.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Cisco Warns Of Ongoing Attacks Targeting Dangerous Flaw]]></title>
						<link>http://www.crn.com/news/security/240153564/cisco-warns-of-ongoing-attacks-targeting-dangerous-flaw.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153564/cisco-warns-of-ongoing-attacks-targeting-dangerous-flaw.htm</guid>
						
						<pubDate>Wed, 24 Apr 2013 15:26:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Attackers are targeting an outdated flaw on one of the most widely used hosting control panels, the Plesk Panel, used by cloud-based hosting providers.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[Verizon Analysis: Top 10 Causes Behind Data Breaches]]></title>
						<link>http://www.crn.com/slide-shows/security/240153446/verizon-analysis-top-10-causes-behind-data-breaches.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240153446/verizon-analysis-top-10-causes-behind-data-breaches.htm</guid>
						
						<pubDate>Wed, 24 Apr 2013 12:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Hit Parade: Oracle Faces Yet Another New Java Bug]]></title>
						<link>http://www.crn.com/news/security/240153527/hit-parade-oracle-faces-yet-another-new-java-bug.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153527/hit-parade-oracle-faces-yet-another-new-java-bug.htm</guid>
						
						<pubDate>Wed, 24 Apr 2013 10:53:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[The latest Java coding error impacts both client- and server-side Java implementations and can be used to bypass built-in security restrictions, says a Security Explorations researcher.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[AP Twitter Account Takeover, Rogue Tweet Leads To Market Hit]]></title>
						<link>http://www.crn.com/news/security/240153448/ap-twitter-account-takeover-rogue-tweet-leads-to-market-hit.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153448/ap-twitter-account-takeover-rogue-tweet-leads-to-market-hit.htm</guid>
						
						<pubDate>Tue, 23 Apr 2013 16:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[A Twitter account hijacking could be linked to weak or stolen passwords, experts say.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Microsoft Security Tool Helps Slam The Door On Attacks, Says Researcher]]></title>
						<link>http://www.crn.com/news/security/240153415/microsoft-security-tool-helps-slam-the-door-on-attacks-says-researcher.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153415/microsoft-security-tool-helps-slam-the-door-on-attacks-says-researcher.htm</guid>
						
						<pubDate>Tue, 23 Apr 2013 10:55:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Microsoft's Enhanced Mitigation Experience Toolkit can make it much more difficult for attackers to gain an initial foothold into corporate systems, says a Verizon security researcher.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
				
			
			
			
			
		
		
				
	





						
							<item>
						<title><![CDATA[Top 10 Malware Threats To Microsoft PCs]]></title>
						<link>http://www.crn.com/slide-shows/security/240153331/top-10-malware-threats-to-microsoft-pcs.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/slide-shows/security/240153331/top-10-malware-threats-to-microsoft-pcs.htm</guid>
						
						<pubDate>Tue, 23 Apr 2013 10:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Trojans, adware, viruses, worms and spyware are used by cybercriminals to steal account credentials and ultimately gain access to credit card data, intellectual property and other information. Here's a look at the top 10 threats.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[Verizon Data Breach Report Finds Employees At Core Of Most Attacks]]></title>
						<link>http://www.crn.com/news/security/240153344/verizon-data-breach-report-finds-employees-at-core-of-most-attacks.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153344/verizon-data-breach-report-finds-employees-at-core-of-most-attacks.htm</guid>
						
						<pubDate>Mon, 22 Apr 2013 20:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Attackers are choosing the least sophisticated methods, often turning to phishing attacks and stolen account credentials, to gain a foothold into corporate networks, according to the 2013 Verizon Data Breach Investigations Report.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[ForeScout To Launch FireEye Connector For APT Detection]]></title>
						<link>http://www.crn.com/news/security/240153342/forescout-to-launch-fireeye-connector-for-apt-detection.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153342/forescout-to-launch-fireeye-connector-for-apt-detection.htm</guid>
						
						<pubDate>Mon, 22 Apr 2013 16:12:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[The network access control platform maker will offer a plug-in to the FireEye antimalware platform for free to its current customers.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[McAfee Channel Chief Details Partner Growth (Video)]]></title>
						<link>http://www.crn.com/news/security/240153312/mcafee-channel-chief-details-partner-growth-video.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153312/mcafee-channel-chief-details-partner-growth-video.htm</guid>
						
						<pubDate>Mon, 22 Apr 2013 12:01:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[The security firm is increasingly relying on the channel to boost sales in its security portfolio, according to McAfee's channel chief, Gavin Struthers.]]>
						</description>
					
						</item>
						
					
						
						





	
	
		
			
			
			
			
				
			
		
		
				
	





						
							<item>
						<title><![CDATA[HP Readies Security MSP Program, Inks Big Deal With CSC]]></title>
						<link>http://www.crn.com/news/security/240153239/hp-readies-security-msp-program-inks-big-deal-with-csc.htm?cid=rss_tax_Security</link>
						<guid>http://www.crn.com/news/security/240153239/hp-readies-security-msp-program-inks-big-deal-with-csc.htm</guid>
						
						<pubDate>Fri, 19 Apr 2013 10:00:00 -0400</pubDate>
						<author>Robert Westervelt</author>
						<description>
							<![CDATA[Top executives are investing millions to encourage channel growth and attempting to attract resellers and managed security services providers for its ArcSight and Fortify security business.]]>
						</description>
					
						</item>
						
					
				
			
</channel>
</rss>