<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-03-12T16:35:00+00:00</dc:date>

	
	<item>
		<title> Domain Security Report: Are Global 2000 Companies Doing Enough on Domain Security? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsdomain-security-report-are-global-2000-companies-doing-enough-on-domain-security</guid>
		<link>https://circleid.com/postsdomain-security-report-are-global-2000-companies-doing-enough-on-domain-security</link>
		<description><![CDATA[A six year study of Global 2000 firms finds progress on email authentication but worrying gaps elsewhere. Despite rising DMARC adoption, falling DNS redundancy and uneven regional uptake leave companies exposed to domain based attacks. <a href="https://circleid.com/postsdomain-security-report-are-global-2000-companies-doing-enough-on-domain-security">More...</a>]]></description>
		<dc:date>2026-03-12T09:35:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Time to Act as Apple Sets Wheels in Motion for Shorter Certificate Life Cycles (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/poststime-to-act-as-apple-sets-wheels-in-motion-for-shorter-certificate-life-cycles</guid>
		<link>https://circleid.com/poststime-to-act-as-apple-sets-wheels-in-motion-for-shorter-certificate-life-cycles</link>
		<description><![CDATA[You may have read our previous blog about the pending reduction of digital certificate life cycles to just 90 days. This past weekend, the issue gained momentum at the Certification Authority Browser Forum when more detail was discussed following the proposed ballot to set a timeline for shorter lifetime certificates by Apple. This creates real urgency for organizations of all sizes to seriously consider and implement automation into their certificate life cycle management. <a href="https://circleid.com/poststime-to-act-as-apple-sets-wheels-in-motion-for-shorter-certificate-life-cycles">More...</a>]]></description>
		<dc:date>2026-03-12T09:35:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Dos and Don'ts of DNS Management (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20240821-the-dos-and-donts-of-dns-management</guid>
		<link>https://circleid.com/posts20240821-the-dos-and-donts-of-dns-management</link>
		<description><![CDATA[The domain name system (DNS) is vital for businesses as it facilitates customer access to online services and resources. Strategic DNS management plays a pivotal role in cybersecurity, safeguarding against threat vectors and ensuring secure global connectivity across online channels including apps, email, websites, application programming interfaces (APIs) and more. <a href="https://circleid.com/posts20240821-the-dos-and-donts-of-dns-management">More...</a>]]></description>
		<dc:date>2026-03-12T09:35:00-07:00</dc:date>
	</item>
	
	<item>
		<title> How You Can Be Hijacked Without Actually Being Hacked (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20230501-how-you-can-be-hijacked-without-actually-being-hacked</guid>
		<link>https://circleid.com/posts20230501-how-you-can-be-hijacked-without-actually-being-hacked</link>
		<description><![CDATA[Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. <a href="https://circleid.com/posts20230501-how-you-can-be-hijacked-without-actually-being-hacked">More...</a>]]></description>
		<dc:date>2026-03-12T09:35:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>