<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Magazine</title>
    <description>Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.</description>
    <link>https://www.securitymagazine.com/rss/articles</link>
    <item>
      <title>The Security Metric That’s Failing You</title>
      <description>
        <![CDATA[<p>Security teams have measured patch rates for so long that somewhere along the way, the metric became the strategy.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102245-the-security-metric-thats-failing-you</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102245</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Stressed-woman-at-laptop-by-Elisa-Ventur.webp?t=1776778706" type="image/png" length="446361"/>
    </item>
    <item>
      <title>What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore </title>
      <description>
        <![CDATA[<p><em>The Pitt&nbsp;</em>may end its story with systems restored, but real hospitals don’t get that clean ending.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 16 Apr 2026 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102236-what-the-pitt-gets-right-about-ransomware-and-what-hospitals-cant-afford-to-ignore</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102236</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Ambulance-by-Albert-Stoynov.webp?t=1776279946" type="image/png" length="501861"/>
    </item>
    <item>
      <title>Democratized Software, Democratized Risk: Who’s Accountable When Everyone Codes?</title>
      <description>
        <![CDATA[<p>How to modernize risk management when software creation becomes broadly distributed. </p>]]>
      </description>
      <pubDate>Thu, 16 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102234-democratized-software-democratized-risk-whos-accountable-when-everyone-codes</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102234</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Pink-and-orange-laptop-by-Joshua-Reddekopp.webp?t=1776268323" type="image/png" length="188461"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1776276359" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Mexico Security Crisis: Never Waste a Crisis</title>
      <description>
        <![CDATA[<p>The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102185-mexico-security-crisis-never-waste-a-crisis</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102185</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Four-people-in-suits-by-Vitaly-Gariev.webp?t=1773848065" type="image/png" length="428539"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1773279399" type="image/png" length="437035"/>
    </item>
    <item>
      <title>AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare</title>
      <description>
        <![CDATA[<p>AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.</p>]]>
      </description>
      <pubDate>Tue, 24 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102143-ai-generated-image-based-harm-is-becoming-a-security-issue-organizations-must-prepare</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102143</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/23/AI-computer-chip-by-Immo-Wegmann.webp?t=1773279401" type="image/png" length="754546"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>Understanding Breaches Before and After They Happen: What Every Organization Should Know</title>
      <description>
        <![CDATA[<p>Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.</p>]]>
      </description>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102121-understanding-breaches-before-and-after-they-happen-what-every-organization-should-know</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102121</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Two-open-padlocks-with-one-closed-by-FlyD.webp?t=1771464183" type="image/png" length="344327"/>
    </item>
    <item>
      <title>2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers.</span>
</p>]]>
      </description>
      <pubDate>Wed, 28 Jan 2026 13:46:49 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102101-2026-enterprise-security-trends-what-leaders-must-prepare-for-in-an-interconnected-risk-landscape</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102101</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/nastuh-abootalebi-yWwob8kwOCk-unsplash-(1).webp?t=1769625646" type="image/jpeg" length="118868"/>
    </item>
    <item>
      <title>Strong Privacy Requires Strong Security — and GenAI Raises the Stakes</title>
      <description>
        <![CDATA[<p>Privacy and security are not competing disciplines; they are inseparable components of the same responsibility.</p>]]>
      </description>
      <pubDate>Wed, 28 Jan 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102098-strong-privacy-requires-strong-security-and-genai-raises-the-stakes</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102098</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/27/Keys-on-yellow-background-by-Alp-Duran.webp?t=1769531813" type="image/png" length="411957"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>With New AI Executive Order, Security Burdens Shift to Users And Organizations</title>
      <description>
        <![CDATA[<p>Preparing for the future of AI regulation.</p>]]>
      </description>
      <pubDate>Mon, 19 Jan 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102079-with-new-ai-executive-order-security-burdens-shift-to-users-and-organizations</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102079</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Conference-room-by-Campaign-Creators.webp?t=1769044795" type="image/png" length="529219"/>
    </item>
    <item>
      <title>Why it’s Time to Move on From Legacy Access Control Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The modern workplace or campus looks very different from even a decade ago — and older access control systems struggle to keep up.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Thu, 08 Jan 2026 11:42:58 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102057-why-its-time-to-move-on-from-legacy-access-control-systems</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102057</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/sebastian-scholz-nuki-IJkSskfEqrM-unsplash.webp?t=1767896985" type="image/jpeg" length="70233"/>
    </item>
    <item>
      <title>Compliance Theater: Why Cybersecurity’s Favorite Shakespearean Tragedy is Failing Us</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">IT security teams, especially the compliance cast, love drama. The slower, more arcane, and less intelligible the script, the louder the applause.</span>
</p>]]>
      </description>
      <pubDate>Tue, 06 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102062-compliance-theater-why-cybersecuritys-favorite-shakespearean-tragedy-is-failing-us</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102062</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/freestocks-I_pOqP6kCOI-unsplash-(5).webp?t=1769044796" type="image/jpeg" length="123978"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
    <item>
      <title>Cybercrime Economics: AI’s Impact and How to Shift Defenses</title>
      <description>
        <![CDATA[<p>AI changed the economics of cybercrime. In 2026, defenses must change with it.</p>]]>
      </description>
      <pubDate>Wed, 31 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102056-cybercrime-economics-ais-impact-and-how-to-shift-defenses</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102056</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Rendered-computer-with-coding-by-Growtika.webp?t=1766163379" type="image/png" length="281882"/>
    </item>
    <item>
      <title>The Most Dangerous 6 Weeks of the Year</title>
      <description>
        <![CDATA[<p>Attackers are planning around your holidays. The question is whether you’ve done the same.</p>]]>
      </description>
      <pubDate>Thu, 11 Dec 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102040-the-most-dangerous-6-weeks-of-the-year</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102040</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/10/Calendar-with-pins-by-Towfiqu-barbhuiya.webp?t=1765382355" type="image/png" length="233997"/>
    </item>
    <item>
      <title>Is Your Biggest Security Threat Already in Your Ear?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">When a theft occurs at a blackjack table or a disturbance erupts near the slot machines, every second counts.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Thu, 04 Dec 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102028-is-your-biggest-security-threat-already-in-your-ear</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102028</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/03/Cards-and-chips-on-table-by-Micha-Parzuchowski.webp?t=1764776115" type="image/png" length="337832"/>
    </item>
    <item>
      <title>Securing Retail’s Trillion-Dollar Season: How Cybercriminals Exploit Peak Holiday Pressure</title>
      <description>
        <![CDATA[<p>5 recommendations to strengthen retail cyber resilience during the holiday season.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 02 Dec 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102024-securing-retails-trillion-dollar-season-how-cybercriminals-exploit-peak-holiday-pressure</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102024</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/01/Gift-cards-and-credit-cards-by-Dylan-Gillis.webp?t=1764812376" type="image/png" length="557124"/>
    </item>
    <item>
      <title>High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management</title>
      <description>
        <![CDATA[<p>Breaking down protection guidance for the water and wastewater industry.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 28 Nov 2025 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102018-high-water-mark-cisa-shares-foundations-for-effective-cybersecurity-and-risk-management</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102018</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/21/Water-faucet-and-cup-by-LuAnn-Hunt.webp?t=1764812377" type="image/png" length="371076"/>
    </item>
    <item>
      <title>Bringing AI to The SOC Is Not Intended to Replace Humans</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI in the SOC is showing true promise because it abandons the rigid, rules-based approaches of the past and embraces autonomous reasoning and continuous learning capabilities that have not been previously available.</span></p>]]>
      </description>
      <pubDate>Tue, 11 Nov 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101999-bringing-ai-to-the-soc-is-not-intended-to-replace-humans</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/101999</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/10/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1762789612" type="image/png" length="201182"/>
    </item>
    <item>
      <title>Determining the Credibility of Online Threats in a World of Digital Noise</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While many online threats are nothing more than idle chatter, pranks, or cries for attention, others are chillingly real — and the challenge is determining which is which before tragedy strikes.</span>
</p><br>]]>
      </description>
      <pubDate>Thu, 30 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101983-determining-the-credibility-of-online-threats-in-a-world-of-digital-noise</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/101983</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/29/Stressed-woman-at-laptop-by-Elisa-Ventur.webp?t=1772041697" type="image/png" length="446361"/>
    </item>
    <item>
      <title>PredictiveAI Security: Guarding the Intelligence Behind the GenAI Spotlight</title>
      <description>
        <![CDATA[<p>Why <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">—</span> and how <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">—</span>
predictive AI should be governed.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 28 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101977-predictiveai-security-guarding-the-intelligence-behind-the-genai-spotlight</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/101977</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/27/AI-computer-chip-by-Immo-Wegmann.webp?t=1761578073" type="image/png" length="754546"/>
    </item>
    <item>
      <title>A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The scariest industry developments aren’t happening in the shadows of the dark web; they’re emerging from generative AI operating in broad daylight.</span>
</p>]]>
      </description>
      <pubDate>Thu, 23 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101969-a-real-life-horror-story-when-ai-ghouls-move-faster-than-defenses-can-react</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/101969</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/22/Man-in-mask-by-LED-light-by-Max-Bender.webp?t=1761144193" type="image/png" length="566412"/>
    </item>
    <item>
      <title>Protecting Payments: How a Multilayer Defense Addresses Modern Banking Scams</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The financial services industry is experiencing a surge in fraud rates, driven by the increasing ability of bad actors to access cutting-edge technologies.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 22 Oct 2025 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101968-protecting-payments-how-a-multilayer-defense-addresses-modern-banking-scams</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/101968</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/21/Payment-transaction-by-Towfiqu-barbhuiya.webp?t=1761061296" type="image/png" length="396282"/>
    </item>
    <item>
      <title>Beyond IoCs: Modernizing Cyber Defense in the CISA 2015 Lapse</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">With the CISA 2015 temporarily lapsing, this moment spotlights the ways in which the U.S. must rethink its cyber intelligence strategy.</span></p><br><br>]]>
      </description>
      <pubDate>Mon, 20 Oct 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101963-beyond-iocs-modernizing-cyber-defense-in-the-cisa-2015-lapse</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/101963</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/17/Man-coding-by-KeepCoding.webp?t=1760711081" type="image/png" length="320974"/>
    </item>
  </channel>
</rss>
