<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Data Exfiltration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/data-exfiltration/m-p/2012925#M55087</link>
    <description>&lt;P&gt;How can i detect low and slow data exfiltration with the Cisco IPS?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 12:42:38 GMT</pubDate>
    <dc:creator>bob.bartlett</dc:creator>
    <dc:date>2019-03-10T12:42:38Z</dc:date>
    <item>
      <title>Data Exfiltration</title>
      <link>https://community.cisco.com/t5/network-security/data-exfiltration/m-p/2012925#M55087</link>
      <description>&lt;P&gt;How can i detect low and slow data exfiltration with the Cisco IPS?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/data-exfiltration/m-p/2012925#M55087</guid>
      <dc:creator>bob.bartlett</dc:creator>
      <dc:date>2019-03-10T12:42:38Z</dc:date>
    </item>
    <item>
      <title>Data Exfiltration</title>
      <link>https://community.cisco.com/t5/network-security/data-exfiltration/m-p/2012926#M55088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a valid question.&amp;nbsp; Let's get some discussion going here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob, you wouldn't happen to be talking about 3.H.1. would you?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 18:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/data-exfiltration/m-p/2012926#M55088</guid>
      <dc:creator>chris.cumbaa</dc:creator>
      <dc:date>2012-06-26T18:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: Data Exfiltration</title>
      <link>https://community.cisco.com/t5/network-security/data-exfiltration/m-p/2012927#M55089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I am talking about 3.H.1 also looking at 3.H.1.B I was going to create a custom Signatures that looks for ZIP and RAR files for the compressed files.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 18:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/data-exfiltration/m-p/2012927#M55089</guid>
      <dc:creator>bob.bartlett</dc:creator>
      <dc:date>2012-06-26T18:36:28Z</dc:date>
    </item>
  </channel>
</rss>

