<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz - link info</title>
<link>http://netvouz.com/url/c85a22404f71b643792a47799ce049d9?feed=rss</link>
<description>Info about a link</description>
<item><title>Opportunities evolving from cyber supply chain security concerns</title>
<link>http://www.computer.org/portal/web/computingnow/security/content?g=53319&amp;type=article&amp;urlTitle=opportunities-evolving-from-cyber-supply-chain-security-concerns</link>
<description>Just a few years ago, security breaches were typically enabled by vulnerabilities in the breached organization&#39;s IT infrastructure. Today, however, many security breaches are the consequence of vulnerabilities in the IT infrastructures of the affected organization&#39;s business partners, including the wholesalers, retailers, payment processors and other partners in the organization&#39;s cyber supply chain.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 14 Aug 2014 05:45:06 GMT</pubDate>
</item><item><title>Opportunities evolving from cyber supply chain security concerns</title>
<link>http://www.computer.org/portal/web/computingnow/security/content?g=53319&amp;type=article&amp;urlTitle=opportunities-evolving-from-cyber-supply-chain-security-concerns</link>
<description>Just a few years ago, security breaches were typically enabled by vulnerabilities in the breached organization&#39;s IT infrastructure. Today, however, many security breaches are the consequence of vulnerabilities in the IT infrastructures of the affected organization&#39;s business partners, including the wholesalers, retailers, payment processors and other partners in the organization&#39;s cyber supply chain.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 31 Jul 2014 10:46:06 GMT</pubDate>
</item></channel></rss>