<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-30T19:14:00+00:00</dc:date>

	
	<item>
		<title> Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 2: Taking Control (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20130129_reducing_risks_of_byod_with_dns_based_security_intelligence_part_2</guid>
		<link>https://circleid.com/posts20130129_reducing_risks_of_byod_with_dns_based_security_intelligence_part_2</link>
		<description><![CDATA[In part 1, I talked about some of the risks associated with BYOD. But there are actions you can take to greatly reduce this risk. One effective method for limiting the risk of BYOD is to employ DNS-based security intelligence techniques. DNS-based security intelligence makes use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. <a href="https://circleid.com/posts20130129_reducing_risks_of_byod_with_dns_based_security_intelligence_part_2">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsreducing_risks_of_byod_with_dns_based_security_intelligence_part_1</guid>
		<link>https://circleid.com/postsreducing_risks_of_byod_with_dns_based_security_intelligence_part_1</link>
		<description><![CDATA[Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. <a href="https://circleid.com/postsreducing_risks_of_byod_with_dns_based_security_intelligence_part_1">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>