<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Web Exclusive Stories</title>
    <description>
      <![CDATA[Stories tagged with this taxonomy will show on the fourth tab of the home page]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2150-web-exclusive-stories</link>
    <language>en-us</language>
    <item>
      <title>What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore </title>
      <description>
        <![CDATA[<p><em>The Pitt&nbsp;</em>may end its story with systems restored, but real hospitals don’t get that clean ending.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102236</guid>
      <pubDate>Thu, 16 Apr 2026 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102236-what-the-pitt-gets-right-about-ransomware-and-what-hospitals-cant-afford-to-ignore</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Ambulance-by-Albert-Stoynov.webp?t=1776279946" type="image/png" length="501861"/>
    </item>
    <item>
      <title>Democratized Software, Democratized Risk: Who’s Accountable When Everyone Codes?</title>
      <description>
        <![CDATA[<p>How to modernize risk management when software creation becomes broadly distributed. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102234</guid>
      <pubDate>Thu, 16 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102234-democratized-software-democratized-risk-whos-accountable-when-everyone-codes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Pink-and-orange-laptop-by-Joshua-Reddekopp.webp?t=1776268323" type="image/png" length="188461"/>
    </item>
    <item>
      <title>Ransomware Response: How Businesses Regain Control Under Pressure</title>
      <description>
        <![CDATA[<p>You can’t control when ransomware attacks happen, but you can control how you respond.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102212</guid>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102212-ransomware-response-how-businesses-regain-control-under-pressure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/07/Head-in-front-of-monitors-by-Kevin-Horvat.webp?t=1776276357" type="image/png" length="385769"/>
    </item>
    <item>
      <title>Healthcare Executives Face a New Era of Personal Risk</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Protecting executives’ digital and physical environments is no longer optional.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102208</guid>
      <pubDate>Tue, 07 Apr 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102208-healthcare-executives-face-a-new-era-of-personal-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/06/Man-on-laptop-by-Vitaly-Gariev.webp?t=1775680873" type="image/png" length="346927"/>
    </item>
    <item>
      <title>Physical Security in Global Arenas: How AI Improves Security at Scale</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Transforming physical security from passive surveillance to proactive prevention.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102205</guid>
      <pubDate>Mon, 06 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102205-physical-security-in-global-arenas-how-ai-improves-security-at-scale</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/Stadium-by-Mario-Klassen.webp?t=1775680873" type="image/png" length="686032"/>
    </item>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1776276357" type="image/png" length="470607"/>
    </item>
    <item>
      <title>The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats</title>
      <description>
        <![CDATA[<p>The corporate world has witnessed a dramatic shift in how companies safeguard their top leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102199</guid>
      <pubDate>Wed, 01 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102199-the-rising-tide-of-executive-protection-corporations-ramp-up-security-in-an-era-of-heightened-threats</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/31/Man-walking-with-briefcase-by-Marten-Bjork.webp?t=1774983008" type="image/png" length="369171"/>
    </item>
    <item>
      <title>Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Tax season-related phishing attacks have gotten more sophisticated as threat actors increasingly leverage generative AI.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102192</guid>
      <pubDate>Tue, 31 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102192-tax-season-means-phishing-season-how-individuals-and-businesses-can-protect-themselves</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Calculator-with-pen-and-notebook-by-Recha-Oktaviani.webp?t=1776276357" type="image/png" length="344356"/>
    </item>
    <item>
      <title>Breaking Down “The Mosaic Effect”</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Luke Norris, C<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">o-Founder and CEO of Kamiwaza, about <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“the mosaic effect” and how AI is shaping it today.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102186</guid>
      <pubDate>Thu, 26 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102186-breaking-down-the-mosaic-effect</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/SEC_Web_5Minutes-Norris-0326_1170x658.webp?t=1773855022" type="image/jpeg" length="84529"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1776276359" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Mexico Security Crisis: Never Waste a Crisis</title>
      <description>
        <![CDATA[<p>The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102185</guid>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102185-mexico-security-crisis-never-waste-a-crisis</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Four-people-in-suits-by-Vitaly-Gariev.webp?t=1773848065" type="image/png" length="428539"/>
    </item>
    <item>
      <title>Document Protection: Why Hybrid Storage Is the Future of Security </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Strategically choose which data lives on a server and which lives physically.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102177</guid>
      <pubDate>Tue, 17 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102177-document-protection-why-hybrid-storage-is-the-future-of-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Open-filing-cabinet-by-Maksym-Kaharlytskyi.webp?t=1773670622" type="image/png" length="473786"/>
    </item>
    <item>
      <title>Cracking Cyber’s Talent Gap Challenge</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Solving the cybersecurity workforce challenge requires a shift in perspective.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102169</guid>
      <pubDate>Thu, 12 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102169-cracking-cybers-talent-gap-challenge</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/11/We-are-hiring-sign-by-Eric-Prouzet.webp?t=1773243878" type="image/png" length="597497"/>
    </item>
    <item>
      <title>Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The most advanced security technology in the world cannot recover an asset that was inadequately protected at the most critical moment.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102163</guid>
      <pubDate>Tue, 10 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102163-object-specific-protection-the-non-negotiable-foundation-of-art-and-asset-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Art-museum-by-Andrew-Faires.webp?t=1773063449" type="image/png" length="270613"/>
    </item>
    <item>
      <title>World Cup Safety and Security Is About More than Just Crime</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The 2026 World Cup tests every framework of public safety.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102159</guid>
      <pubDate>Fri, 06 Mar 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102159-world-cup-safety-and-security-is-about-more-than-just-crime</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/05/World-Cup-trophy-beside-goal-by-My-Profit-Tutor.webp?t=1772727405" type="image/png" length="505749"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1773279399" type="image/png" length="437035"/>
    </item>
    <item>
      <title>Harvest Now, Decrypt Later: Preparing for the Quantum Hangover</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Quantum computing will be the next major shockwave to hit cybersecurity.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102146</guid>
      <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102146-harvest-now-decrypt-later-preparing-for-the-quantum-hangover</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/25/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773279398" type="image/png" length="373204"/>
    </item>
    <item>
      <title>AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare</title>
      <description>
        <![CDATA[<p>AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102143</guid>
      <pubDate>Tue, 24 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102143-ai-generated-image-based-harm-is-becoming-a-security-issue-organizations-must-prepare</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/23/AI-computer-chip-by-Immo-Wegmann.webp?t=1773279401" type="image/png" length="754546"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>Understanding Breaches Before and After They Happen: What Every Organization Should Know</title>
      <description>
        <![CDATA[<p>Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102121</guid>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102121-understanding-breaches-before-and-after-they-happen-what-every-organization-should-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Two-open-padlocks-with-one-closed-by-FlyD.webp?t=1771464183" type="image/png" length="344327"/>
    </item>
    <item>
      <title>Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching</title>
      <description>
        <![CDATA[<p>The Super Bowl is not just a game, but a blueprint for how modern risk must be managed.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102114</guid>
      <pubDate>Fri, 06 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102114-security-risks-around-super-bowl-lx-what-security-leaders-should-be-watching</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/05/NFL-footballs-by-Adrian-Curiel.webp?t=1770858201" type="image/png" length="480705"/>
    </item>
    <item>
      <title>Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure</title>
      <description>
        <![CDATA[<p>New analysis of healthcare cyber losses suggests that foundational controls remain the most effective at reducing risk.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102112</guid>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102112-healthcare-cybersecurity-is-in-crisis-these-proven-controls-could-be-the-cure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Medical-professional-using-tablet-by-Nappy.webp?t=1770217941" type="image/png" length="458228"/>
    </item>
    <item>
      <title>Privilege Disruption: The Key Choke Point for Cyber Deterrence</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The government and private sector alike must recognize the importance of privilege disruption.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102111</guid>
      <pubDate>Wed, 04 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102111-privilege-disruption-the-key-choke-point-for-cyber-deterrence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/03/Computer-and-laptop-by-Mamur-Saitbaev.webp?t=1770144049" type="image/png" length="235318"/>
    </item>
    <item>
      <title>Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging</title>
      <description>
        <![CDATA[<p>With pure exfiltration, businesses don’t realize they’re a victim until it’s too late.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102103</guid>
      <pubDate>Mon, 02 Feb 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102103-ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/30/Abstract-rendered-coding-blocks-by-Steve-Johnson.webp?t=1769788357" type="image/png" length="481443"/>
    </item>
    <item>
      <title>The New Battleground of Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with James Maude, Field CTO at BeyondTrust, about what believes is the new battleground of cybersecurity.&nbsp;&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102100</guid>
      <pubDate>Thu, 29 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102100-the-new-battleground-of-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/SEC_Web_5Minutes-Maude-0226_1170x658.webp?t=1769617497" type="image/jpeg" length="98695"/>
    </item>
    <item>
      <title>2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102101</guid>
      <pubDate>Wed, 28 Jan 2026 13:46:49 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102101-2026-enterprise-security-trends-what-leaders-must-prepare-for-in-an-interconnected-risk-landscape</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/nastuh-abootalebi-yWwob8kwOCk-unsplash-(1).webp?t=1769625646" type="image/jpeg" length="118868"/>
    </item>
  </channel>
</rss>
