<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-07T16:34:00+00:00</dc:date>

	
	<item>
		<title> Passwords Are Not Enough: Without Two Factor Authentication Your Business Is At Risk (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20130711_passwords_are_not_enough_two_factor_authentication</guid>
		<link>https://circleid.com/posts20130711_passwords_are_not_enough_two_factor_authentication</link>
		<description><![CDATA[Passwords are no longer sufficient to maintain an adequate level of security for business critical infrastructure and services. Two-factor authentication should be considered the minimum acceptable level of access control. There have been two types of security stories in the technology news over the last few months that should be of particular concern to system administrators and those responsible for maintaining business network infrastructure. <a href="https://circleid.com/posts20130711_passwords_are_not_enough_two_factor_authentication">More...</a>]]></description>
		<dc:date>2026-04-07T09:34:00-07:00</dc:date>
	</item>
	
	<item>
		<title> BIND 9 Users Should Upgrade to Most Recent Version to Avoid Remote Exploit (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20130606_bind_9_upgrade_to_most_recent_version_to_avoid_remote_exploit</guid>
		<link>https://circleid.com/posts20130606_bind_9_upgrade_to_most_recent_version_to_avoid_remote_exploit</link>
		<description><![CDATA[A remote exploit in the BIND 9 DNS software could allow hackers to trigger excessive memory use, significantly impacting the performance of DNS and other services running on the same server. A flaw was recently discovered in the regular expression implementation used by the libdns library, which is part of the BIND package. The flaw enables a remote user to cause the 'named' process to consume excessive amounts of memory, eventually crashing the process and tying up server resources to the point at which the server becomes unresponsive. <a href="https://circleid.com/posts20130606_bind_9_upgrade_to_most_recent_version_to_avoid_remote_exploit">More...</a>]]></description>
		<dc:date>2026-04-07T09:34:00-07:00</dc:date>
	</item>
	
	<item>
		<title> DNS Bug Disclosure: ICANN Releases New Guidelines (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20130411_dns_bug_disclosure_icann_releases_new_guidelines</guid>
		<link>https://circleid.com/posts20130411_dns_bug_disclosure_icann_releases_new_guidelines</link>
		<description><![CDATA[The Internet Corporation for Assigned Names and Numbers (ICANN) has released new guidance concerning the reporting and disclosure of bugs that affect the Domain Name System, including information of how ICANN itself will behave in response to vulnerabilities. Until recently, ICANN, which is responsible for maintaining the root domain servers at the heart of the DNS system, had no specific guidelines for the reporting of vulnerabilities, leaving responsible disclosure protocols up to the researchers who discovered the bug. <a href="https://circleid.com/posts20130411_dns_bug_disclosure_icann_releases_new_guidelines">More...</a>]]></description>
		<dc:date>2026-04-07T09:34:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>