<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-08T19:45:00+00:00</dc:date>

	
	<item>
		<title> New Threats Demand a New Approach to DDoS Protection (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20111031_new_threats_demand_a_new_approach_to_ddos_protection</guid>
		<link>https://circleid.com/posts20111031_new_threats_demand_a_new_approach_to_ddos_protection</link>
		<description><![CDATA[In the past 24 months, distributed denial of service (DDoS) attacks have changed profoundly. Gone are the days when attackers worked under the radar, when machines were infected by botnet code unknowingly and attacks were disguised leaving very little to trace the exact origin. ... The other game-changer: It's easier than ever to execute attacks. The tools are so widely available that anyone with basic skills and a high-speed connection can become a "hacktivist." <a href="https://circleid.com/posts20111031_new_threats_demand_a_new_approach_to_ddos_protection">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>