<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
    <channel>
      <title>IT OT Convergence</title>
      <link>https://itotconvergentie.nl/en</link>
      <description>Last 10 notes on IT OT Convergence</description>
      <generator>Quartz -- quartz.jzhao.xyz</generator>
      <item>
    <title>2FA</title>
    <link>https://itotconvergentie.nl/en/2FA</link>
    <guid>https://itotconvergentie.nl/en/2FA</guid>
    <description><![CDATA[  What is 2FA (Two-Factor Authentication)? 2FA (Two-Factor Authentication) is a security mechanism that requires a user to complete two independent forms of authentication before being granted access to a system. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>802.1X</title>
    <link>https://itotconvergentie.nl/en/802.1X</link>
    <guid>https://itotconvergentie.nl/en/802.1X</guid>
    <description><![CDATA[  What is 802.1X? 802.1X is a network access control protocol that authenticates devices or users before granting them network access. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>ABAC</title>
    <link>https://itotconvergentie.nl/en/ABAC</link>
    <guid>https://itotconvergentie.nl/en/ABAC</guid>
    <description><![CDATA[  What is ABAC? ABAC stands for Attribute-Based Access Control and is a flexible access control model that grants permissions based on multiple attributes. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>ACL</title>
    <link>https://itotconvergentie.nl/en/ACL</link>
    <guid>https://itotconvergentie.nl/en/ACL</guid>
    <description><![CDATA[  What is an ACL? An ACL, or Access Control List, is a network security mechanism used to determine which devices or users may access specific network resources or services. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>AI</title>
    <link>https://itotconvergentie.nl/en/AI</link>
    <guid>https://itotconvergentie.nl/en/AI</guid>
    <description><![CDATA[  What is AI (Artificial Intelligence)? AI, or Artificial Intelligence, is technology that enables systems to independently learn, reason and make decisions based on data — without every scenario having to be programmed in advance. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>APC</title>
    <link>https://itotconvergentie.nl/en/APC</link>
    <guid>https://itotconvergentie.nl/en/APC</guid>
    <description><![CDATA[  What is APC (Advanced Process Control)? APC stands for Advanced Process Control and refers to a collection of advanced control techniques applied on top of basic PID control in order to operate industrial processes more optimally, more stably and more efficiently. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>APT</title>
    <link>https://itotconvergentie.nl/en/APT</link>
    <guid>https://itotconvergentie.nl/en/APT</guid>
    <description><![CDATA[  What is an APT (Advanced Persistent Threat)? An APT (Advanced Persistent Threat) is a sophisticated, long-running and targeted cyberattack, often carried out by well-organised groups such as state actors or professional cybercriminals. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>ARP Spoofing</title>
    <link>https://itotconvergentie.nl/en/ARP-Spoofing</link>
    <guid>https://itotconvergentie.nl/en/ARP-Spoofing</guid>
    <description><![CDATA[  What is ARP Spoofing? ARP Spoofing is an attack technique in which an attacker sends forged ARP messages to bind their MAC address to the IP address of another device. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>ARP poisoning</title>
    <link>https://itotconvergentie.nl/en/ARP-poisoning</link>
    <guid>https://itotconvergentie.nl/en/ARP-poisoning</guid>
    <description><![CDATA[  What is ARP Poisoning? ARP poisoning is an attack in which an adversary sends forged ARP messages onto the network with the goal of manipulating the ARP tables of other devices. ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item><item>
    <title>ARP</title>
    <link>https://itotconvergentie.nl/en/ARP</link>
    <guid>https://itotconvergentie.nl/en/ARP</guid>
    <description><![CDATA[  What is ARP? ARP stands for Address Resolution Protocol and is a network protocol that translates an IP address into a MAC address, enabling communication within a local network (LAN). ]]></description>
    <pubDate>Sun, 10 May 2026 08:44:54 GMT</pubDate>
  </item>
    </channel>
  </rss>