<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.3av.us/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.3av.us/feed.php">
        <title>Antonio Perez - cybersecurity</title>
        <description></description>
        <link>https://wiki.3av.us/</link>
        <image rdf:resource="https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png" />
       <dc:date>2026-04-18T12:27:47+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=cybersecurity:honeypot&amp;rev=1698105444&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=cybersecurity:on_prem_cloud_or_hybrid&amp;rev=1698105543&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=cybersecurity:the_protonmail_guide_to_it_security_for_small_businesses&amp;rev=1696005182&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=cybersecurity:ztna&amp;rev=1719073522&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png">
        <title>Antonio Perez</title>
        <link>https://wiki.3av.us/</link>
        <url>https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png</url>
    </image>
    <item rdf:about="https://wiki.3av.us/doku.php?id=cybersecurity:honeypot&amp;rev=1698105444&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-10-23T23:57:24+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>honeypot</title>
        <link>https://wiki.3av.us/doku.php?id=cybersecurity:honeypot&amp;rev=1698105444&amp;do=diff</link>
        <description>Honeypot

Honeypots: A walk down memory lane

Secure, defend, recover.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=cybersecurity:on_prem_cloud_or_hybrid&amp;rev=1698105543&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-10-23T23:59:03+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>on_prem_cloud_or_hybrid</title>
        <link>https://wiki.3av.us/doku.php?id=cybersecurity:on_prem_cloud_or_hybrid&amp;rev=1698105543&amp;do=diff</link>
        <description>Radware Cybersecurity - On-Prem, Cloud, or Hybrid

Radware Cybersecurity</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=cybersecurity:the_protonmail_guide_to_it_security_for_small_businesses&amp;rev=1696005182&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-09-29T16:33:02+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>the_protonmail_guide_to_it_security_for_small_businesses</title>
        <link>https://wiki.3av.us/doku.php?id=cybersecurity:the_protonmail_guide_to_it_security_for_small_businesses&amp;rev=1696005182&amp;do=diff</link>
        <description>The ProtonMail  Guide to IT Security for Small Businesses</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=cybersecurity:ztna&amp;rev=1719073522&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-06-22T16:25:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ztna</title>
        <link>https://wiki.3av.us/doku.php?id=cybersecurity:ztna&amp;rev=1719073522&amp;do=diff</link>
        <description>ZTNA as defined by Gartner

ZTNA provides controlled access to resources to reduce the attack surface. The isolation offered by ZTNA improves connectivity and eliminates the need to directly expose applications to the Internet, which is an untrusted transport. Instead, access to applications occurs through an intermediary, which can be a cloud service controlled by a third-party provider or a self-hosted service.</description>
    </item>
</rdf:RDF>
