<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Magazine</title>
    <description>Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.</description>
    <link>https://www.securitymagazine.com/rss/articles</link>
    <item>
      <title>Company Database Deleted by AI Agent: What Security Leaders Need to Know</title>
      <description>
        <![CDATA[<p>Nine seconds — that’s how long it took for an AI agent to delete a company’s <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">production database and volume-level backups.&nbsp;</span></p>]]>
      </description>
      <pubDate>Fri, 01 May 2026 12:10:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102278-company-database-deleted-by-ai-agent-what-security-leaders-need-to-know</link>
      <guid>http://www.securitymagazine.com/articles/102278</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/AI-computer-chip-by-Immo-Wegmann.webp?t=1777650906" type="image/png" length="754546"/>
    </item>
    <item>
      <title>The Browser Blind Spot Your Privacy Program Is Missing </title>
      <description>
        <![CDATA[<p>Most privacy&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">programs still have one gap in common: the browser.</span>
</p>]]>
      </description>
      <pubDate>Fri, 01 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102279-the-browser-blind-spot-your-privacy-program-is-missing</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102279</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/30/Laptop-with-crumbled-papers-by-Lauren-Mancke.webp?t=1777575702" type="image/png" length="452930"/>
    </item>
    <item>
      <title>12 Tips for Building an Effective Security Budget</title>
      <description>
        <![CDATA[<p>Alan Saquella, CPP, shares 12 tips for building a strong security budget.</p>]]>
      </description>
      <pubDate>Fri, 01 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102247-12-tips-for-building-an-effective-security-budget</link>
      <guid>http://www.securitymagazine.com/articles/102247</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F1-Feat-Slide1-1170x658.webp?t=1776794133" type="image/jpeg" length="145053"/>
    </item>
    <item>
      <title>New Research: AI-Driven Cybercrime Led to a 389% Increase in Ransomware Victims </title>
      <description>
        <![CDATA[<p>An overview of cyber threat trends from the previous year.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 30 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102277-new-research-ai-driven-cybercrime-led-to-a-389-increase-in-ransomware-victims</link>
      <guid>http://www.securitymagazine.com/articles/102277</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/30/Half-open-laptop-by-Agung-Raharja.webp?t=1777559747" type="image/png" length="177227"/>
    </item>
    <item>
      <title>Building Public/Private Partnerships That Actually Move the Needle</title>
      <description>
        <![CDATA[<p>Public and private sector partnerships strengthen security at every level.</p>]]>
      </description>
      <pubDate>Thu, 30 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102223-building-public-private-partnerships-that-actually-move-the-needle</link>
      <guid>http://www.securitymagazine.com/articles/102223</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F4-Feat-Slide1-1170x658.webp?t=1775663758" type="image/jpeg" length="84465"/>
    </item>
    <item>
      <title>Connected Security: How Proactive Real-Time Tech Keeps Security Workers Safe</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">New technologies are allowing companies to take more proactive approaches and monitor vulnerable employees.&nbsp;</span></p><br>]]>
      </description>
      <pubDate>Wed, 29 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102272-connected-security-how-proactive-real-time-tech-keeps-security-workers-safe</link>
      <guid>http://www.securitymagazine.com/articles/102272</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/28/Security-guard-by-Ben-Wicks.webp?t=1777384503" type="image/png" length="277129"/>
    </item>
    <item>
      <title>Ransomware Responsible for 90% of Manufacturing Cyber Losses</title>
      <description>
        <![CDATA[<p>When ransomware attacks affect the sector, the losses are significant.&nbsp;</p>]]>
      </description>
      <pubDate>Wed, 29 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102276-ransomware-responsible-for-90-of-manufacturing-cyber-losses</link>
      <guid>http://www.securitymagazine.com/articles/102276</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/29/Manufacturing-by-Simon-Kadula.webp?t=1777473450" type="image/png" length="630352"/>
    </item>
    <item>
      <title>Protecting U.S. Critical Infrastructure as Global Tensions Rise</title>
      <description>
        <![CDATA[<p>Security leader discusses protecting critical infrastructure as geopolitical tensions grow.</p>]]>
      </description>
      <pubDate>Wed, 29 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102222-protecting-us-critical-infrastructure-as-global-tensions-rise</link>
      <guid>http://www.securitymagazine.com/articles/102222</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Talk-Feat-Slide1-1170x658.webp?t=1775662528" type="image/jpeg" length="98148"/>
    </item>
    <item>
      <title>Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare</title>
      <description>
        <![CDATA[<p>What healthcare security leaders need to know about d<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">e-escalation training.&nbsp;</span></p>]]>
      </description>
      <pubDate>Tue, 28 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102265-why-de-escalation-must-be-part-of-a-layered-safety-strategy-in-healthcare</link>
      <guid>http://www.securitymagazine.com/articles/102265</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/Nurse-by-MedicAlert-UK.webp?t=1777303043" type="image/png" length="354218"/>
    </item>
    <item>
      <title>Less Than 10% of Higher Education Has No Intention of Adopting AI</title>
      <description>
        <![CDATA[<p>The majority of universities have either adopted AI or intend to soon.</p>]]>
      </description>
      <pubDate>Tue, 28 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102220-less-than-10-of-higher-education-has-no-intention-of-adopting-ai</link>
      <guid>http://www.securitymagazine.com/articles/102220</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-News2-Feat-Slide1-1170x658.webp?t=1775662047" type="image/jpeg" length="106811"/>
    </item>
    <item>
      <title>2025 Saw Fewer Healthcare Breaches Than 2024</title>
      <description>
        <![CDATA[<p>2025 healthcare breaches dropped from 2024</p>]]>
      </description>
      <pubDate>Tue, 28 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102219-2025-saw-fewer-healthcare-breaches-than-2024</link>
      <guid>http://www.securitymagazine.com/articles/102219</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-News1-Feat-Slide1-1170x658.webp?t=1775661643" type="image/jpeg" length="81736"/>
    </item>
    <item>
      <title>What the Medtronic Breach Means for Security Experts</title>
      <description>
        <![CDATA[<p>Security experts are sharing their insights on the broader implications of this breach. </p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102266-what-the-medtronic-breach-means-for-security-experts</link>
      <guid>http://www.securitymagazine.com/articles/102266</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/Laptop-and-coffee-in-shade-by-Guillermo-Latorre.webp?t=1777306421" type="image/png" length="371256"/>
    </item>
    <item>
      <title>Why Energy Infrastructure Is Cybersecurity’s Next Frontier</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Energy infrastructure represents cybersecurity’s next frontier because it changes the scope and speed at which risks evolve.</span>
</p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102261-why-energy-infrastructure-is-cybersecuritys-next-frontier</link>
      <guid>http://www.securitymagazine.com/articles/102261</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Electric-substation-by-American-Public-Power-Association.webp?t=1777042094" type="image/png" length="454782"/>
    </item>
    <item>
      <title>ADT Breach Confirmed: Names, Phone Numbers, and Addresses Exposed</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ADT discovered unauthorized access of customer and prospective customer information.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 08:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102264-adt-breach-confirmed-names-phone-numbers-and-addresses-exposed</link>
      <guid>http://www.securitymagazine.com/articles/102264</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/ADT-on-wall-by-the-blowup.webp?t=1777292461" type="image/png" length="406047"/>
    </item>
    <item>
      <title>Security Career or Security Blanket? Turning Fearful Staying into Commitment</title>
      <description>
        <![CDATA[<p>Building a culture where your best security people choose your organization is key.</p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102218-security-career-or-security-blanket-turning-fearful-staying-into-commitment</link>
      <guid>http://www.securitymagazine.com/articles/102218</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Career-Feat-Slide1-1170x658.webp?t=1775661149" type="image/jpeg" length="73202"/>
    </item>
    <item>
      <title>Netherlands Faces Greatest National Security Threat Since World War Two</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Dutch intelligence agency AIVD says the Netherlands is facing the greatest national security threat in decades.&nbsp;</span></p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102263-netherlands-faces-greatest-national-security-threat-since-world-war-two</link>
      <guid>http://www.securitymagazine.com/articles/102263</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Netherlands-on-a-map-by-KOBU-Agency.webp?t=1777047639" type="image/png" length="401733"/>
    </item>
    <item>
      <title>How Physical Security Data Is Supporting Public Safety Challenges</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The use of physical security data is driven predominantly by concerns for officer safety.&nbsp;</span></p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 12:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102262-how-physical-security-data-is-supporting-public-safety-challenges</link>
      <guid>http://www.securitymagazine.com/articles/102262</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Security-guard-in-hallway-by-Izzuddin-Azzam.webp?t=1777045012" type="image/png" length="320589"/>
    </item>
    <item>
      <title>What Claude and OpenClaw Vulnerabilities Reveal About AI Agents</title>
      <description>
        <![CDATA[<p>Claude and OpenClaw vulnerabilities reveal why AI agents must be governed like privileged identities.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102257-what-claude-and-openclaw-vulnerabilities-reveal-about-ai-agents</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102257</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-up-close-by-Igor-Omilaev.webp?t=1776966219" type="image/png" length="445428"/>
    </item>
    <item>
      <title>Succeeding an Underwhelming Leader</title>
      <description>
        <![CDATA[<p>Security leaders discuss taking over leadership after an underperforming leader.</p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102217-succeeding-an-underwhelming-leader</link>
      <guid>http://www.securitymagazine.com/articles/102217</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Leader-Feat-Slide1-1170x658.webp?t=1775660728" type="image/jpeg" length="35610"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Claude Mythos Breach </title>
      <description>
        <![CDATA[<p>What security experts are saying about the Claude Mythos breach.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102253-security-leaders-discuss-the-claude-mythos-breach</link>
      <guid>http://www.securitymagazine.com/articles/102253</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-by-Igor-Omilaev.webp?t=1776956192" type="image/png" length="845851"/>
    </item>
    <item>
      <title>Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption</title>
      <description>
        <![CDATA[<p>While vulnerability management and patching remain necessary, they are not sufficient to address the new reality that Mythos represents.</p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 11:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102250-operationally-ineffective-putting-cves-in-a-chokehold-with-privilege-disruption</link>
      <guid>http://www.securitymagazine.com/articles/102250</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-with-green-code-by-Moritz-Erken.webp?t=1776868738" type="image/png" length="374989"/>
    </item>
    <item>
      <title>NIST’s New Prioritization Criteria for CVEs, Examined by Experts</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">NIST recently changed how it handles CVEs.&nbsp;</span></p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102255-nists-new-prioritization-criteria-for-cves-examined-by-experts</link>
      <guid>http://www.securitymagazine.com/articles/102255</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/Green-padlock-on-keyboard-by-rupixen.webp?t=1776955351" type="image/png" length="306013"/>
    </item>
    <item>
      <title>How Should Effective AI Red Teams Operate?</title>
      <description>
        <![CDATA[<p>Dr. Peter Garraghan speaks with <em>Security </em>magazine about AI-specific red teaming.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102249-how-should-effective-ai-red-teams-operate</link>
      <guid>http://www.securitymagazine.com/articles/102249</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/SEC_Web_5Minutes-Garraghan-0426_1170x658.webp?t=1776873919" type="image/jpeg" length="99911"/>
    </item>
    <item>
      <title>Unauthorized Users Accessed Claude Mythos, New Reports Suggest</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Anthropic’s new AI model may have been accessed by unauthorized users.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102251-unauthorized-users-accessed-claude-mythos-new-reports-suggest</link>
      <guid>http://www.securitymagazine.com/articles/102251</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-in-darkness-by-Hostaphoto.webp?t=1776877073" type="image/png" length="125623"/>
    </item>
    <item>
      <title>Why Bridging Siloes Doesn’t Need to Be Complicated</title>
      <description>
        <![CDATA[<p>Bruce McIndoe provides actionable steps for bridging siloes.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102240-why-bridging-siloes-doesnt-need-to-be-complicated</link>
      <guid>http://www.securitymagazine.com/articles/102240</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/McIndoe-podcast-news-header.webp?t=1776785504" type="image/png" length="120498"/>
    </item>
    <item>
      <title>Hackers Claim 19M Records Stolen From French Government Agency</title>
      <description>
        <![CDATA[<p>The <span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">France Titres&nbsp;<span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">discovered a security incident.&nbsp;</span></span></p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102248-hackers-claim-19m-records-stolen-from-french-government-agency</link>
      <guid>http://www.securitymagazine.com/articles/102248</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/French-flag-by-Rafael-Garcin.webp?t=1776860491" type="image/png" length="263048"/>
    </item>
    <item>
      <title>The Security Metric That’s Failing You</title>
      <description>
        <![CDATA[<p>Security teams have measured patch rates for so long that somewhere along the way, the metric became the strategy.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102245-the-security-metric-thats-failing-you</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102245</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Stressed-woman-at-laptop-by-Elisa-Ventur.webp?t=1776778706" type="image/png" length="446361"/>
    </item>
    <item>
      <title>The Privacy–Security Partnership: How We Bend Risk in a Resource Crunch</title>
      <description>
        <![CDATA[<p>The partnership between cybersecurity and privacy matters now more than ever.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102216-the-privacysecurity-partnership-how-we-bend-risk-in-a-resource-crunch</link>
      <guid>http://www.securitymagazine.com/articles/102216</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Cyber-Feat-Slide1-1170x658.webp?t=1775658579" type="image/jpeg" length="106368"/>
    </item>
    <item>
      <title>Safe Learning 101 Program Supports Schools in Strengthening Campus Security</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine speaks with the&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">expert partner behind this program.&nbsp;</span></p>]]>
      </description>
      <pubDate>Tue, 21 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102237-safe-learning-101-program-supports-schools-in-strengthening-campus-security</link>
      <guid>http://www.securitymagazine.com/articles/102237</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Stacked-books-by-Kimberly-Farmer.webp?t=1776895794" type="image/png" length="348053"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Vercel Breach</title>
      <description>
        <![CDATA[<p>Security leaders are discussing the Vercel breach.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 21 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102246-security-leaders-discuss-the-vercel-breach</link>
      <guid>http://www.securitymagazine.com/articles/102246</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Office-supplies-by-Amy-Hirschi.webp?t=1776783392" type="image/png" length="332942"/>
    </item>
  </channel>
</rss>
