<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments for RSI Security</title>
	<atom:link href="https://blog.rsisecurity.com/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.rsisecurity.com</link>
	<description>Blog</description>
	<lastBuildDate>Thu, 21 May 2020 21:49:39 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.16</generator>
	<item>
		<title>Comment on Tips For Creating a Strong Vulnerability Assessment Report by Arianna Dorantes</title>
		<link>https://blog.rsisecurity.com/tips-for-creating-a-strong-vulnerability-assessment-report/#comment-9539</link>
		<dc:creator><![CDATA[Arianna Dorantes]]></dc:creator>
		<pubDate>Thu, 21 May 2020 21:49:39 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=5862#comment-9539</guid>
		<description><![CDATA[Hi James, thanks for reaching out! To answer your question, it&#039;s not one or the other. Both VA tools and manual assessments are incorporated into an overall risk assessment strategy. You need to combine automated scans, manual reviews, risk/impact analysis processes for a holistic approach to vulnerability and risk management.]]></description>
		<content:encoded><![CDATA[<p>Hi James, thanks for reaching out! To answer your question, it&#8217;s not one or the other. Both VA tools and manual assessments are incorporated into an overall risk assessment strategy. You need to combine automated scans, manual reviews, risk/impact analysis processes for a holistic approach to vulnerability and risk management.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Managed IT Services vs SAAS: What&#8217;s the Difference? by Arianna Dorantes</title>
		<link>https://blog.rsisecurity.com/managed-it-services-vs-saas-whats-the-difference/#comment-9538</link>
		<dc:creator><![CDATA[Arianna Dorantes]]></dc:creator>
		<pubDate>Thu, 21 May 2020 21:24:50 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=6298#comment-9538</guid>
		<description><![CDATA[Thanks for your kind words Braden!]]></description>
		<content:encoded><![CDATA[<p>Thanks for your kind words Braden!</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Does PCI Compliance Apply to Payment Facilitators? by Arianna Dorantes</title>
		<link>https://blog.rsisecurity.com/does-pci-compliance-apply-to-payment-facilitators/#comment-9537</link>
		<dc:creator><![CDATA[Arianna Dorantes]]></dc:creator>
		<pubDate>Thu, 21 May 2020 21:23:37 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=6254#comment-9537</guid>
		<description><![CDATA[We appreciate the compliment Arjun! We&#039;re happy to share our expertise with those looking to learn :)]]></description>
		<content:encoded><![CDATA[<p>We appreciate the compliment Arjun! We&#8217;re happy to share our expertise with those looking to learn 🙂</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on What Are The Soc 2 Compliance Requirements? by Arianna Dorantes</title>
		<link>https://blog.rsisecurity.com/what-are-the-soc-2-compliance-requirements/#comment-9536</link>
		<dc:creator><![CDATA[Arianna Dorantes]]></dc:creator>
		<pubDate>Thu, 21 May 2020 21:10:51 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=5333#comment-9536</guid>
		<description><![CDATA[Hi Reed, thanks for your inquiry! We would love to further discuss the guidelines for achieving SOC 2 Compliance on call with you. My colleague will be reaching out to you shortly. Otherwise feel free to request a free consultation here: https://www.rsisecurity.com/compliance-advisory-services/soc2/]]></description>
		<content:encoded><![CDATA[<p>Hi Reed, thanks for your inquiry! We would love to further discuss the guidelines for achieving SOC 2 Compliance on call with you. My colleague will be reaching out to you shortly. Otherwise feel free to request a free consultation here: <a href="https://www.rsisecurity.com/compliance-advisory-services/soc2/" rel="nofollow">https://www.rsisecurity.com/compliance-advisory-services/soc2/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on PII in the Sky by Arianna Dorantes</title>
		<link>https://blog.rsisecurity.com/pii-in-the-sky/#comment-9535</link>
		<dc:creator><![CDATA[Arianna Dorantes]]></dc:creator>
		<pubDate>Thu, 21 May 2020 21:08:22 +0000</pubDate>
		<guid isPermaLink="false">http://rsi.test/2017/09/11/pii-in-the-sky/#comment-9535</guid>
		<description><![CDATA[As you mentioned as long as you include proper credit and sources back to our blog, that would be fine with us :)]]></description>
		<content:encoded><![CDATA[<p>As you mentioned as long as you include proper credit and sources back to our blog, that would be fine with us 🙂</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on SOC 2 Type 1 vs. Type 2: What’s the Difference? by Arianna Dorantes</title>
		<link>https://blog.rsisecurity.com/soc-2-type-1-vs-type-2-whats-the-difference/#comment-9534</link>
		<dc:creator><![CDATA[Arianna Dorantes]]></dc:creator>
		<pubDate>Thu, 21 May 2020 21:05:13 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=5462#comment-9534</guid>
		<description><![CDATA[Hi there, feel free to request a free consultation here: https://www.rsisecurity.com/compliance-advisory-services/soc2/
We would love to hop on a call to better understand your specific organization in order to give the best estimate on pricing.]]></description>
		<content:encoded><![CDATA[<p>Hi there, feel free to request a free consultation here: <a href="https://www.rsisecurity.com/compliance-advisory-services/soc2/" rel="nofollow">https://www.rsisecurity.com/compliance-advisory-services/soc2/</a><br />
We would love to hop on a call to better understand your specific organization in order to give the best estimate on pricing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on What is the Difference Between a VA Scan and a Pen Test? by James Hardin</title>
		<link>https://blog.rsisecurity.com/what-is-the-difference-between-a-va-scan-and-a-pen-test/#comment-9447</link>
		<dc:creator><![CDATA[James Hardin]]></dc:creator>
		<pubDate>Mon, 18 May 2020 10:21:08 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=5724#comment-9447</guid>
		<description><![CDATA[Thanks for this post. This gave a clear idea about VA and PT.]]></description>
		<content:encoded><![CDATA[<p>Thanks for this post. This gave a clear idea about VA and PT.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Tips For Creating a Strong Vulnerability Assessment Report by James Hardin</title>
		<link>https://blog.rsisecurity.com/tips-for-creating-a-strong-vulnerability-assessment-report/#comment-9352</link>
		<dc:creator><![CDATA[James Hardin]]></dc:creator>
		<pubDate>Wed, 13 May 2020 09:51:48 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=5862#comment-9352</guid>
		<description><![CDATA[Is it better to use a premium tool for VA or using manual assessment? I found some major flaws that cannot be identified by tools. What you think?]]></description>
		<content:encoded><![CDATA[<p>Is it better to use a premium tool for VA or using manual assessment? I found some major flaws that cannot be identified by tools. What you think?</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on SOC 2 Type 1 vs. Type 2: What’s the Difference? by Soc Reporter</title>
		<link>https://blog.rsisecurity.com/soc-2-type-1-vs-type-2-whats-the-difference/#comment-9218</link>
		<dc:creator><![CDATA[Soc Reporter]]></dc:creator>
		<pubDate>Tue, 05 May 2020 18:55:51 +0000</pubDate>
		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=5462#comment-9218</guid>
		<description><![CDATA[Hello,
  We are beginning the journey of SOC compliance and wanted to get a rough estimate on how pricing works? It would be ideal to get SOC2 Type 2 report as we are a SaaS company.

Thanks]]></description>
		<content:encoded><![CDATA[<p>Hello,<br />
  We are beginning the journey of SOC compliance and wanted to get a rough estimate on how pricing works? It would be ideal to get SOC2 Type 2 report as we are a SaaS company.</p>
<p>Thanks</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on PII in the Sky by Sl4sh.io</title>
		<link>https://blog.rsisecurity.com/pii-in-the-sky/#comment-9199</link>
		<dc:creator><![CDATA[Sl4sh.io]]></dc:creator>
		<pubDate>Mon, 04 May 2020 20:16:12 +0000</pubDate>
		<guid isPermaLink="false">http://rsi.test/2017/09/11/pii-in-the-sky/#comment-9199</guid>
		<description><![CDATA[Do you mind if I quote a few of your articles as long as 
I provide credit and sources back to your blog?
My blog site is in the very same niche as yours 
and my visitors would definitely benefit from a lot of the information you present 
here. Please let me know if this okay with you. Thank you!]]></description>
		<content:encoded><![CDATA[<p>Do you mind if I quote a few of your articles as long as<br />
I provide credit and sources back to your blog?<br />
My blog site is in the very same niche as yours<br />
and my visitors would definitely benefit from a lot of the information you present<br />
here. Please let me know if this okay with you. Thank you!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
