<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>virtualised technology &#8211; iOCO Switzerland</title>
	<atom:link href="https://ch.ioco.tech/tag/virtualised-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://ch.ioco.tech</link>
	<description>We are iOCO</description>
	<lastBuildDate>Thu, 10 Oct 2024 19:46:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://ch.ioco.tech/wp-content/uploads/2025/01/cropped-icon-32x32.png</url>
	<title>virtualised technology &#8211; iOCO Switzerland</title>
	<link>https://ch.ioco.tech</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CA Southern Africa, Veracode best practices for container security</title>
		<link>https://ch.ioco.tech/ca-southern-africa-veracode-best-practices-for-container-security/</link>
		
		<dc:creator><![CDATA[iOCO]]></dc:creator>
		<pubDate>Wed, 14 Dec 2022 08:02:13 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[application security]]></category>
		<category><![CDATA[Craig De Lucchi]]></category>
		<category><![CDATA[cyber security risks]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Veracode software]]></category>
		<category><![CDATA[virtualised technology]]></category>
		<guid isPermaLink="false">https://staging.ch.ioco.tech/new/?p=75478</guid>

					<description><![CDATA[As cyber security risks steadily increase, application security has become crucial. That means secure coding practices must be part of every developer’s skillset, says Craig De Lucchi, CA Southern Africa, Account Director. How code is written, and the steps taken to update and monitor it, have a big impact on organisations and their applications. There [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology</title>
		<link>https://ch.ioco.tech/adoption-of-software-containers-has-risen-dramatically/</link>
		
		<dc:creator><![CDATA[iOCO]]></dc:creator>
		<pubDate>Fri, 09 Dec 2022 10:27:40 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[containerisation]]></category>
		<category><![CDATA[Craig De Lucchi]]></category>
		<category><![CDATA[software containers]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[virtualised technology]]></category>
		<guid isPermaLink="false">https://staging.ch.ioco.tech/new/?p=75467</guid>

					<description><![CDATA[Container security is a fairly new technology, especially when viewed in the context of the speed of light technology changes in the fourth industrial revolution (4IR). Container technology itself is a topic that many security practitioners continue to find confusing, but its use is spreading fast, says Craig De Lucchi, Account Director, CA Southern Africa. [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
