<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Magazine</title>
    <description>Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.</description>
    <link>https://www.securitymagazine.com/rss/articles</link>
    <item>
      <title>The Bench You'll Need in Three Years Depends on Decisions You Make Now</title>
      <description>
        <![CDATA[<p>Today’s hiring shortcut is tomorrow’s talent shortage.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 14 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102299</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709" type="image/png" length="302550"/>
    </item>
    <item>
      <title>Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Cybersecurity is no longer a function that can be delegated and reviewed after the fact.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 13 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102297</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Glowing-fibers-by-Luke-Jones.webp?t=1778673918" type="image/png" length="660440"/>
    </item>
    <item>
      <title>AI Will Tell Your Breach Story for the Next Two Years — Day One Decides What It Says</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Fri, 08 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102295</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Megaphone-by-Igor-Omilaev.webp?t=1778183697" type="image/png" length="664838"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Need to Think Like Business Leaders</title>
      <description>
        <![CDATA[<p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.&nbsp;</p>]]>
      </description>
      <pubDate>Wed, 06 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102288-cybersecurity-professionals-need-to-think-like-business-leaders</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102288</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516" type="image/png" length="448831"/>
    </item>
    <item>
      <title>The Browser Blind Spot Your Privacy Program Is Missing </title>
      <description>
        <![CDATA[<p>Most privacy&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">programs still have one gap in common: the browser.</span>
</p>]]>
      </description>
      <pubDate>Fri, 01 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102279-the-browser-blind-spot-your-privacy-program-is-missing</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102279</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/30/Laptop-with-crumbled-papers-by-Lauren-Mancke.webp?t=1777575702" type="image/png" length="452930"/>
    </item>
    <item>
      <title>What Claude and OpenClaw Vulnerabilities Reveal About AI Agents</title>
      <description>
        <![CDATA[<p>Claude and OpenClaw vulnerabilities reveal why AI agents must be governed like privileged identities.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102257-what-claude-and-openclaw-vulnerabilities-reveal-about-ai-agents</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102257</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-up-close-by-Igor-Omilaev.webp?t=1776966219" type="image/png" length="445428"/>
    </item>
    <item>
      <title>The Security Metric That’s Failing You</title>
      <description>
        <![CDATA[<p>Security teams have measured patch rates for so long that somewhere along the way, the metric became the strategy.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102245-the-security-metric-thats-failing-you</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102245</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Stressed-woman-at-laptop-by-Elisa-Ventur.webp?t=1776778706" type="image/png" length="446361"/>
    </item>
    <item>
      <title>What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore </title>
      <description>
        <![CDATA[<p><em>The Pitt&nbsp;</em>may end its story with systems restored, but real hospitals don’t get that clean ending.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 16 Apr 2026 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102236-what-the-pitt-gets-right-about-ransomware-and-what-hospitals-cant-afford-to-ignore</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102236</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Ambulance-by-Albert-Stoynov.webp?t=1776279946" type="image/png" length="501861"/>
    </item>
    <item>
      <title>Democratized Software, Democratized Risk: Who’s Accountable When Everyone Codes?</title>
      <description>
        <![CDATA[<p>How to modernize risk management when software creation becomes broadly distributed. </p>]]>
      </description>
      <pubDate>Thu, 16 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102234-democratized-software-democratized-risk-whos-accountable-when-everyone-codes</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102234</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Pink-and-orange-laptop-by-Joshua-Reddekopp.webp?t=1776268323" type="image/png" length="188461"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1776276359" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Mexico Security Crisis: Never Waste a Crisis</title>
      <description>
        <![CDATA[<p>The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102185-mexico-security-crisis-never-waste-a-crisis</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102185</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Four-people-in-suits-by-Vitaly-Gariev.webp?t=1773848065" type="image/png" length="428539"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1773279399" type="image/png" length="437035"/>
    </item>
    <item>
      <title>AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare</title>
      <description>
        <![CDATA[<p>AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.</p>]]>
      </description>
      <pubDate>Tue, 24 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102143-ai-generated-image-based-harm-is-becoming-a-security-issue-organizations-must-prepare</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102143</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/23/AI-computer-chip-by-Immo-Wegmann.webp?t=1773279401" type="image/png" length="754546"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>Understanding Breaches Before and After They Happen: What Every Organization Should Know</title>
      <description>
        <![CDATA[<p>Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.</p>]]>
      </description>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102121-understanding-breaches-before-and-after-they-happen-what-every-organization-should-know</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102121</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Two-open-padlocks-with-one-closed-by-FlyD.webp?t=1771464183" type="image/png" length="344327"/>
    </item>
    <item>
      <title>2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers.</span>
</p>]]>
      </description>
      <pubDate>Wed, 28 Jan 2026 13:46:49 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102101-2026-enterprise-security-trends-what-leaders-must-prepare-for-in-an-interconnected-risk-landscape</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102101</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/nastuh-abootalebi-yWwob8kwOCk-unsplash-(1).webp?t=1769625646" type="image/jpeg" length="118868"/>
    </item>
    <item>
      <title>Strong Privacy Requires Strong Security — and GenAI Raises the Stakes</title>
      <description>
        <![CDATA[<p>Privacy and security are not competing disciplines; they are inseparable components of the same responsibility.</p>]]>
      </description>
      <pubDate>Wed, 28 Jan 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102098-strong-privacy-requires-strong-security-and-genai-raises-the-stakes</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102098</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/27/Keys-on-yellow-background-by-Alp-Duran.webp?t=1769531813" type="image/png" length="411957"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>With New AI Executive Order, Security Burdens Shift to Users And Organizations</title>
      <description>
        <![CDATA[<p>Preparing for the future of AI regulation.</p>]]>
      </description>
      <pubDate>Mon, 19 Jan 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102079-with-new-ai-executive-order-security-burdens-shift-to-users-and-organizations</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102079</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Conference-room-by-Campaign-Creators.webp?t=1769044795" type="image/png" length="529219"/>
    </item>
    <item>
      <title>Why it’s Time to Move on From Legacy Access Control Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The modern workplace or campus looks very different from even a decade ago — and older access control systems struggle to keep up.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Thu, 08 Jan 2026 11:42:58 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102057-why-its-time-to-move-on-from-legacy-access-control-systems</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102057</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/sebastian-scholz-nuki-IJkSskfEqrM-unsplash.webp?t=1767896985" type="image/jpeg" length="70233"/>
    </item>
    <item>
      <title>Compliance Theater: Why Cybersecurity’s Favorite Shakespearean Tragedy is Failing Us</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">IT security teams, especially the compliance cast, love drama. The slower, more arcane, and less intelligible the script, the louder the applause.</span>
</p>]]>
      </description>
      <pubDate>Tue, 06 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102062-compliance-theater-why-cybersecuritys-favorite-shakespearean-tragedy-is-failing-us</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102062</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/freestocks-I_pOqP6kCOI-unsplash-(5).webp?t=1769044796" type="image/jpeg" length="123978"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
    <item>
      <title>Cybercrime Economics: AI’s Impact and How to Shift Defenses</title>
      <description>
        <![CDATA[<p>AI changed the economics of cybercrime. In 2026, defenses must change with it.</p>]]>
      </description>
      <pubDate>Wed, 31 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102056-cybercrime-economics-ais-impact-and-how-to-shift-defenses</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102056</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Rendered-computer-with-coding-by-Growtika.webp?t=1766163379" type="image/png" length="281882"/>
    </item>
    <item>
      <title>The Most Dangerous 6 Weeks of the Year</title>
      <description>
        <![CDATA[<p>Attackers are planning around your holidays. The question is whether you’ve done the same.</p>]]>
      </description>
      <pubDate>Thu, 11 Dec 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102040-the-most-dangerous-6-weeks-of-the-year</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102040</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/10/Calendar-with-pins-by-Towfiqu-barbhuiya.webp?t=1765382355" type="image/png" length="233997"/>
    </item>
    <item>
      <title>Is Your Biggest Security Threat Already in Your Ear?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">When a theft occurs at a blackjack table or a disturbance erupts near the slot machines, every second counts.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Thu, 04 Dec 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102028-is-your-biggest-security-threat-already-in-your-ear</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102028</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/03/Cards-and-chips-on-table-by-Micha-Parzuchowski.webp?t=1764776115" type="image/png" length="337832"/>
    </item>
    <item>
      <title>Securing Retail’s Trillion-Dollar Season: How Cybercriminals Exploit Peak Holiday Pressure</title>
      <description>
        <![CDATA[<p>5 recommendations to strengthen retail cyber resilience during the holiday season.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 02 Dec 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102024-securing-retails-trillion-dollar-season-how-cybercriminals-exploit-peak-holiday-pressure</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102024</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/01/Gift-cards-and-credit-cards-by-Dylan-Gillis.webp?t=1764812376" type="image/png" length="557124"/>
    </item>
    <item>
      <title>High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management</title>
      <description>
        <![CDATA[<p>Breaking down protection guidance for the water and wastewater industry.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 28 Nov 2025 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102018-high-water-mark-cisa-shares-foundations-for-effective-cybersecurity-and-risk-management</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102018</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/21/Water-faucet-and-cup-by-LuAnn-Hunt.webp?t=1764812377" type="image/png" length="371076"/>
    </item>
  </channel>
</rss>
