<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Web Exclusive Stories</title>
    <description>
      <![CDATA[Stories tagged with this taxonomy will show on the fourth tab of the home page]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2150-web-exclusive-stories</link>
    <language>en-us</language>
    <item>
      <title>Cracking Cyber’s Talent Gap Challenge</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Solving the cybersecurity workforce challenge requires a shift in perspective.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102169</guid>
      <pubDate>Thu, 12 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102169-cracking-cybers-talent-gap-challenge</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/11/We-are-hiring-sign-by-Eric-Prouzet.webp?t=1773243878" type="image/png" length="597497"/>
    </item>
    <item>
      <title>Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The most advanced security technology in the world cannot recover an asset that was inadequately protected at the most critical moment.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102163</guid>
      <pubDate>Tue, 10 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102163-object-specific-protection-the-non-negotiable-foundation-of-art-and-asset-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Art-museum-by-Andrew-Faires.webp?t=1773063449" type="image/png" length="270613"/>
    </item>
    <item>
      <title>World Cup Safety and Security Is About More than Just Crime</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The 2026 World Cup tests every framework of public safety.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102159</guid>
      <pubDate>Fri, 06 Mar 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102159-world-cup-safety-and-security-is-about-more-than-just-crime</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/05/World-Cup-trophy-beside-goal-by-My-Profit-Tutor.webp?t=1772727405" type="image/png" length="505749"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1773279399" type="image/png" length="437035"/>
    </item>
    <item>
      <title>Harvest Now, Decrypt Later: Preparing for the Quantum Hangover</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Quantum computing will be the next major shockwave to hit cybersecurity.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102146</guid>
      <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102146-harvest-now-decrypt-later-preparing-for-the-quantum-hangover</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/25/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773279398" type="image/png" length="373204"/>
    </item>
    <item>
      <title>AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare</title>
      <description>
        <![CDATA[<p>AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102143</guid>
      <pubDate>Tue, 24 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102143-ai-generated-image-based-harm-is-becoming-a-security-issue-organizations-must-prepare</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/23/AI-computer-chip-by-Immo-Wegmann.webp?t=1773279401" type="image/png" length="754546"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>Understanding Breaches Before and After They Happen: What Every Organization Should Know</title>
      <description>
        <![CDATA[<p>Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102121</guid>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102121-understanding-breaches-before-and-after-they-happen-what-every-organization-should-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Two-open-padlocks-with-one-closed-by-FlyD.webp?t=1771464183" type="image/png" length="344327"/>
    </item>
    <item>
      <title>Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching</title>
      <description>
        <![CDATA[<p>The Super Bowl is not just a game, but a blueprint for how modern risk must be managed.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102114</guid>
      <pubDate>Fri, 06 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102114-security-risks-around-super-bowl-lx-what-security-leaders-should-be-watching</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/05/NFL-footballs-by-Adrian-Curiel.webp?t=1770858201" type="image/png" length="480705"/>
    </item>
    <item>
      <title>Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure</title>
      <description>
        <![CDATA[<p>New analysis of healthcare cyber losses suggests that foundational controls remain the most effective at reducing risk.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102112</guid>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102112-healthcare-cybersecurity-is-in-crisis-these-proven-controls-could-be-the-cure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Medical-professional-using-tablet-by-Nappy.webp?t=1770217941" type="image/png" length="458228"/>
    </item>
    <item>
      <title>Privilege Disruption: The Key Choke Point for Cyber Deterrence</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The government and private sector alike must recognize the importance of privilege disruption.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102111</guid>
      <pubDate>Wed, 04 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102111-privilege-disruption-the-key-choke-point-for-cyber-deterrence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/03/Computer-and-laptop-by-Mamur-Saitbaev.webp?t=1770144049" type="image/png" length="235318"/>
    </item>
    <item>
      <title>Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging</title>
      <description>
        <![CDATA[<p>With pure exfiltration, businesses don’t realize they’re a victim until it’s too late.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102103</guid>
      <pubDate>Mon, 02 Feb 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102103-ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/30/Abstract-rendered-coding-blocks-by-Steve-Johnson.webp?t=1769788357" type="image/png" length="481443"/>
    </item>
    <item>
      <title>The New Battleground of Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with James Maude, Field CTO at BeyondTrust, about what believes is the new battleground of cybersecurity.&nbsp;&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102100</guid>
      <pubDate>Thu, 29 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102100-the-new-battleground-of-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/SEC_Web_5Minutes-Maude-0226_1170x658.webp?t=1769617497" type="image/jpeg" length="98695"/>
    </item>
    <item>
      <title>2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102101</guid>
      <pubDate>Wed, 28 Jan 2026 13:46:49 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102101-2026-enterprise-security-trends-what-leaders-must-prepare-for-in-an-interconnected-risk-landscape</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/nastuh-abootalebi-yWwob8kwOCk-unsplash-(1).webp?t=1769625646" type="image/jpeg" length="118868"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>The Post-Breach Narrative: Winning Back Trust After the Headlines Fade</title>
      <description>
        <![CDATA[<p>Understanding trust as a strategic asset.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102080</guid>
      <pubDate>Tue, 20 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102080-the-post-breach-narrative-winning-back-trust-after-the-headlines-fade</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Phone-with-message-icon-by-Franck.webp?t=1769044794" type="image/png" length="437381"/>
    </item>
    <item>
      <title>With New AI Executive Order, Security Burdens Shift to Users And Organizations</title>
      <description>
        <![CDATA[<p>Preparing for the future of AI regulation.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102079</guid>
      <pubDate>Mon, 19 Jan 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102079-with-new-ai-executive-order-security-burdens-shift-to-users-and-organizations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Conference-room-by-Campaign-Creators.webp?t=1769044795" type="image/png" length="529219"/>
    </item>
    <item>
      <title>The Identity Theft Risk Profile of NBA and NFL Draft Prospects</title>
      <description>
        <![CDATA[<h4>Does making a draft list increase the risk of identity theft?&nbsp;</h4>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102071</guid>
      <pubDate>Mon, 12 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102071-the-identity-theft-risk-profile-of-nba-and-nfl-draft-prospects</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/09/Basketball-on-yellow-and-green-floor-by-Vino-Li.webp?t=1767976210" type="image/png" length="582568"/>
    </item>
    <item>
      <title>Why it’s Time to Move on From Legacy Access Control Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The modern workplace or campus looks very different from even a decade ago — and older access control systems struggle to keep up.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102057</guid>
      <pubDate>Thu, 08 Jan 2026 11:42:58 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102057-why-its-time-to-move-on-from-legacy-access-control-systems</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/sebastian-scholz-nuki-IJkSskfEqrM-unsplash.webp?t=1767896985" type="image/jpeg" length="70233"/>
    </item>
    <item>
      <title>Is Email the Entry Point to a Well-Rounded Disinformation Attack?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Email has always been the nervous system of business communication and is trusted, immediate and universal.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102065</guid>
      <pubDate>Thu, 08 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102065-is-email-the-entry-point-to-a-well-rounded-disinformation-attack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/brett-jordan-LPZy4da9aRo-unsplash-(1).webp?t=1769044794" type="image/jpeg" length="142611"/>
    </item>
    <item>
      <title>The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess</title>
      <description>
        <![CDATA[<p>Artificial intelligence is reshaping instruction, cybersecurity threats are becoming more advanced, and digital tools are expanding faster than most districts can keep up with.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102063</guid>
      <pubDate>Wed, 07 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102063-the-ai-powered-classroom-network-of-the-future-because-hackers-never-take-recess</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/ivan-aleksic-PDRFeeDniCk-unsplash-(2).webp?t=1769044794" type="image/jpeg" length="129137"/>
    </item>
    <item>
      <title>Compliance Theater: Why Cybersecurity’s Favorite Shakespearean Tragedy is Failing Us</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">IT security teams, especially the compliance cast, love drama. The slower, more arcane, and less intelligible the script, the louder the applause.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102062</guid>
      <pubDate>Tue, 06 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102062-compliance-theater-why-cybersecuritys-favorite-shakespearean-tragedy-is-failing-us</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/freestocks-I_pOqP6kCOI-unsplash-(5).webp?t=1769044796" type="image/jpeg" length="123978"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
    <item>
      <title>Cybercrime Economics: AI’s Impact and How to Shift Defenses</title>
      <description>
        <![CDATA[<p>AI changed the economics of cybercrime. In 2026, defenses must change with it.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102056</guid>
      <pubDate>Wed, 31 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102056-cybercrime-economics-ais-impact-and-how-to-shift-defenses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Rendered-computer-with-coding-by-Growtika.webp?t=1766163379" type="image/png" length="281882"/>
    </item>
    <item>
      <title>How Can CISOs Create the Ideal Cyber Budget? </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Here, <em>Security </em>magazine talks with Chris Wheeler, CISO at Resilience, about how CISOs can create the ideal cyber budget for the new year. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102046</guid>
      <pubDate>Tue, 30 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102046-how-can-cisos-create-the-ideal-cyber-budget</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/12/SEC_Web_5Minutes-Wheeler-1225_1170x658.webp?t=1765559331" type="image/jpeg" length="68256"/>
    </item>
  </channel>
</rss>
