<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/audiopodcast/tag/data breach"/>
        <atom:link rel="next" href="https://video.algosec.com/audiopodcast/tag/data breach?tag=data+breach&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/audio/podcast/54506817-7-audio.mp3" type="audio/mp3" length="1325861"/>
            <title>The Capital One Breach: How to avoid the Misconfiguration danger?</title>
            <link>http://video.algosec.com/the-capital-one-breach-how-to-avoid</link>
            <description>&lt;p&gt;&lt;b&gt;Prof. Avishai Wool explains the Capital One data breach, which exposed the personal information of nearly 106 million people.&lt;/b&gt; &lt;br&gt;&lt;br&gt;The AlgoSec network security policy management solution provides holistic visibility across cloud, on-premise, SDN and hybrid environments, enabling you to proactively analyze risk from the business perspective, intelligently automate security changes, avoid misconfiguration incidents and ensure continuous compliance.
&lt;p&gt;&lt;b&gt;Click &lt;/b&gt;&lt;a href="https://www.algosec.com/lp/see-algosec-action-2/?utm_source=Email&amp;amp;utm_campaign=2019-08-06_The_Capital_One_Breach_Global_%5BEM%5D_%5BQ32019%5Dhttp://"&gt;&lt;b&gt;here &lt;/b&gt;&lt;/a&gt;&lt;b&gt;to learn how.&lt;/b&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-capital-one-breach-how-to-avoid"&gt;&lt;img src="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54506817</guid>
            <pubDate>Tue, 06 Aug 2019 15:36:01 GMT</pubDate>
            <media:title>The Capital One Breach: How to avoid the Misconfiguration danger?</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Prof. Avishai Wool explains the Capital One data breach, which exposed the personal information of nearly 106 million people.&lt;/b&gt; &lt;br&gt;&lt;br&gt;The AlgoSec network security policy management solution provides holistic visibility across cloud, on-premise, SDN and hybrid environments, enabling you to proactively analyze risk from the business perspective, intelligently automate security changes, avoid misconfiguration incidents and ensure continuous compliance.
&lt;p&gt;&lt;b&gt;Click &lt;/b&gt;&lt;a href="https://www.algosec.com/lp/see-algosec-action-2/?utm_source=Email&amp;amp;utm_campaign=2019-08-06_The_Capital_One_Breach_Global_%5BEM%5D_%5BQ32019%5Dhttp://"&gt;&lt;b&gt;here &lt;/b&gt;&lt;/a&gt;&lt;b&gt;to learn how.&lt;/b&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-capital-one-breach-how-to-avoid"&gt;&lt;img src="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9df22f0a0caaa15f1c04a08448676bee&amp;source=podcast&amp;photo%5fid=54506817" width="625" height="352" type="text/html" medium="video" duration="221" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/>
            <category>cyber security</category>
            <category>Data breach</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
    </channel>
</rss>
