<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-07T16:34:00+00:00</dc:date>

	
	<item>
		<title> Ethical Hacking: Turning The Tables to Boost Cyber Security (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20160610_ethical_hacking_turning_the_tables_to_boost_cyber_security</guid>
		<link>https://circleid.com/posts20160610_ethical_hacking_turning_the_tables_to_boost_cyber_security</link>
		<description><![CDATA[Hacking remains a huge problem for businesses. As noted by MarketWatch, more than 175 data breaches have already happened this year, and in 2015 approximately 105 million adults in the United States had their personal information stolen. For companies, the stakes are huge: Compromised systems not only damage the bottom line but can severely impact public opinion. <a href="https://circleid.com/posts20160610_ethical_hacking_turning_the_tables_to_boost_cyber_security">More...</a>]]></description>
		<dc:date>2026-04-07T09:34:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>