<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-08T19:45:00+00:00</dc:date>

	
	<item>
		<title> Experienced a Breach? Here Are Four Tips for Incident Response (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20151230_experienced_a_breach_here_are_four_tips_for_incident_response</guid>
		<link>https://circleid.com/posts20151230_experienced_a_breach_here_are_four_tips_for_incident_response</link>
		<description><![CDATA[The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. <a href="https://circleid.com/posts20151230_experienced_a_breach_here_are_four_tips_for_incident_response">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>