<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Logical Security</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: monsitj (iStock / Getty Images Plus)</em></p>

<p>Learn about logical security strategies and technologies that protect digital assets, data, and networks from unauthorized access and cyber threats.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2229</link>
    <language>en-us</language>
    <item>
      <title>Ransomware Response: How Businesses Regain Control Under Pressure</title>
      <description>
        <![CDATA[<p>You can’t control when ransomware attacks happen, but you can control how you respond.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102212</guid>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102212-ransomware-response-how-businesses-regain-control-under-pressure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/07/Head-in-front-of-monitors-by-Kevin-Horvat.webp?t=1775572604" type="image/png" length="385769"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773759029" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Taming the Threat Beast: Building a Threat-Led Cybersecurity Program</title>
      <description>
        <![CDATA[<p>Moving from noisy threat feeds to focused intelligence that security teams can actually act on.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102175</guid>
      <pubDate>Fri, 20 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102175-taming-the-threat-beast-building-a-threat-led-cybersecurity-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Cyber-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="198421"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1773279399" type="image/png" length="437035"/>
    </item>
    <item>
      <title>Harvest Now, Decrypt Later: Preparing for the Quantum Hangover</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Quantum computing will be the next major shockwave to hit cybersecurity.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102146</guid>
      <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102146-harvest-now-decrypt-later-preparing-for-the-quantum-hangover</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/25/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773279398" type="image/png" length="373204"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>Understanding Breaches Before and After They Happen: What Every Organization Should Know</title>
      <description>
        <![CDATA[<p>Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102121</guid>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102121-understanding-breaches-before-and-after-they-happen-what-every-organization-should-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Two-open-padlocks-with-one-closed-by-FlyD.webp?t=1771464183" type="image/png" length="344327"/>
    </item>
    <item>
      <title>Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure</title>
      <description>
        <![CDATA[<p>New analysis of healthcare cyber losses suggests that foundational controls remain the most effective at reducing risk.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102112</guid>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102112-healthcare-cybersecurity-is-in-crisis-these-proven-controls-could-be-the-cure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Medical-professional-using-tablet-by-Nappy.webp?t=1770217941" type="image/png" length="458228"/>
    </item>
    <item>
      <title>Leveraging ISACA for Your CMMC Career</title>
      <description>
        <![CDATA[<p>The Cybersecurity Maturity Model Certification sets the benchmark for how DoW contractors prove cybersecurity readiness.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102105</guid>
      <pubDate>Tue, 03 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102105-leveraging-isaca-for-your-cmmc-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Cyber-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="229204"/>
    </item>
    <item>
      <title>Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging</title>
      <description>
        <![CDATA[<p>With pure exfiltration, businesses don’t realize they’re a victim until it’s too late.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102103</guid>
      <pubDate>Mon, 02 Feb 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102103-ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/30/Abstract-rendered-coding-blocks-by-Steve-Johnson.webp?t=1769788357" type="image/png" length="481443"/>
    </item>
    <item>
      <title>Securing Trust: Why Crisis Communication is Your First Line of Defense</title>
      <description>
        <![CDATA[<p>Trust is lost in minutes during a crisis, and clear, human communication is the only way to win it back.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102099</guid>
      <pubDate>Fri, 30 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102099-securing-trust-why-crisis-communication-is-your-first-line-of-defense</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Cyber-Feat-Slide1-1170x658.webp?t=1769609318" type="image/jpeg" length="49788"/>
    </item>
    <item>
      <title>The New Battleground of Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with James Maude, Field CTO at BeyondTrust, about what believes is the new battleground of cybersecurity.&nbsp;&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102100</guid>
      <pubDate>Thu, 29 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102100-the-new-battleground-of-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/SEC_Web_5Minutes-Maude-0226_1170x658.webp?t=1769617497" type="image/jpeg" length="98695"/>
    </item>
    <item>
      <title>Strong Privacy Requires Strong Security — and GenAI Raises the Stakes</title>
      <description>
        <![CDATA[<p>Privacy and security are not competing disciplines; they are inseparable components of the same responsibility.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102098</guid>
      <pubDate>Wed, 28 Jan 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102098-strong-privacy-requires-strong-security-and-genai-raises-the-stakes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/27/Keys-on-yellow-background-by-Alp-Duran.webp?t=1769531813" type="image/png" length="411957"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
    <item>
      <title>Cybercrime Economics: AI’s Impact and How to Shift Defenses</title>
      <description>
        <![CDATA[<p>AI changed the economics of cybercrime. In 2026, defenses must change with it.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102056</guid>
      <pubDate>Wed, 31 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102056-cybercrime-economics-ais-impact-and-how-to-shift-defenses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Rendered-computer-with-coding-by-Growtika.webp?t=1766163379" type="image/png" length="281882"/>
    </item>
    <item>
      <title>Sizing Up Top Tech Trends and Priorities for 2026</title>
      <description>
        <![CDATA[<p>A look into areas security professionals and digital trust practitioners should be mindful of in the year to come.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102050</guid>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102050-sizing-up-top-tech-trends-and-priorities-for-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Cyber-Feat-Slide1-1170x658.webp?t=1768469521" type="image/jpeg" length="71899"/>
    </item>
    <item>
      <title>630M Passwords Stolen, FBI Reveals: What This Says About Credential Value</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>630 million passwords were stolen, highlighting the value of passwords and password protection.&nbsp;</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102054</guid>
      <pubDate>Thu, 18 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102054-630m-passwords-stolen-fbi-reveals-what-this-says-about-credential-value</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/17/Padlock-opened-with-computer-keys-by-FlyD.webp?t=1765991583" type="image/png" length="583225"/>
    </item>
    <item>
      <title>Human Oversight Is the Missing Link in GenAI Trust</title>
      <description>
        <![CDATA[<p>Human oversight will determine when genAI becomes enterprise-grade.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102048</guid>
      <pubDate>Tue, 16 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102048-human-oversight-is-the-missing-link-in-genai-trust</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/15/AI-chip-up-close-by-Igor-Omilaev.webp?t=1765818573" type="image/png" length="445428"/>
    </item>
    <item>
      <title>The Most Dangerous 6 Weeks of the Year</title>
      <description>
        <![CDATA[<p>Attackers are planning around your holidays. The question is whether you’ve done the same.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102040</guid>
      <pubDate>Thu, 11 Dec 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102040-the-most-dangerous-6-weeks-of-the-year</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/10/Calendar-with-pins-by-Towfiqu-barbhuiya.webp?t=1765382355" type="image/png" length="233997"/>
    </item>
    <item>
      <title>Navigating Cybersecurity’s Tightrope: Balancing Skills, AI, and Human Resilience</title>
      <description>
        <![CDATA[<p>A walk through for running a successful test that turns lessons into lasting resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102015</guid>
      <pubDate>Wed, 26 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102015-navigating-cybersecuritys-tightrope-balancing-skills-ai-and-human-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Cyber-Feat-Slide1-1170x658.webp?t=1763574175" type="image/jpeg" length="28026"/>
    </item>
    <item>
      <title>How Does Metadata Help in Digital Forensic Investigations?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Metadata proves to be a powerful ally in digital forensics investigations.</span>
</p><br><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102019</guid>
      <pubDate>Tue, 25 Nov 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102019-how-does-metadata-help-in-digital-forensic-investigations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/24/Magnifying-glass-over-laptop-by-Agence-Olloweb.webp?t=1764812378" type="image/png" length="332543"/>
    </item>
    <item>
      <title>What AI Vulnerabilities Do Security Leaders Tend To Overlook?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with John Watters, CEO and Managing Partner at iCOUNTER, about managing the risks associated with AI adversaries.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102012</guid>
      <pubDate>Thu, 20 Nov 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102012-what-ai-vulnerabilities-do-security-leaders-tend-to-overlook</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/14/SEC_Web_5Minutes-Watters-1125_1170x658.webp?t=1763138840" type="image/jpeg" length="89475"/>
    </item>
    <item>
      <title>Inside The 2025 Security Benchmark Report</title>
      <description>
        <![CDATA[<p>Rachelle Blair-Frasier, Editor in Chief at <em>Security</em> magazine, presents a selection of findings from The 2025 Security Benchmark Report.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102009</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102009-inside-the-2025-security-benchmark-report</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Talk-Feat-Slide1-1170x658.webp?t=1763047752" type="image/jpeg" length="83767"/>
    </item>
    <item>
      <title>Bringing AI to The SOC Is Not Intended to Replace Humans</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI in the SOC is showing true promise because it abandons the rigid, rules-based approaches of the past and embraces autonomous reasoning and continuous learning capabilities that have not been previously available.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101999</guid>
      <pubDate>Tue, 11 Nov 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101999-bringing-ai-to-the-soc-is-not-intended-to-replace-humans</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/10/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1762789612" type="image/png" length="201182"/>
    </item>
    <item>
      <title>Rethinking Data Collection in Identity Security</title>
      <description>
        <![CDATA[<p>The key to an effective security strategy lies not in collecting more information, but in focusing on the right data to ensure safety without unnecessary exposure.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101981</guid>
      <pubDate>Wed, 29 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101981-rethinking-data-collection-in-identity-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/28/Glasses-in-front-of-coding-on-screen-by-Oleksandr-Chumak.webp?t=1761665234" type="image/png" length="755410"/>
    </item>
    <item>
      <title>The New Era of Supply Chain Attacks: When One Falls, All Fall</title>
      <description>
        <![CDATA[<p>Third-party ecosystems are now one of the most profitable attack avenues as when one supplier is compromised, the effects can quickly ripple through entire industries.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101974</guid>
      <pubDate>Mon, 27 Oct 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101974-the-new-era-of-supply-chain-attacks-when-one-falls-all-fall</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/24/Person-holding-red-puzzle-piece-by-Ryoji-Iwata.webp?t=1761322009" type="image/png" length="183451"/>
    </item>
    <item>
      <title>The Moment of Truth: Conducting Your BCP Test and Capturing Lessons</title>
      <description>
        <![CDATA[<p>A walk through for running a successful test that turns lessons into lasting resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101973</guid>
      <pubDate>Mon, 27 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101973-the-moment-of-truth-conducting-your-bcp-test-and-capturing-lessons</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-Cyber-Feat-Slide1-1170x658.webp?t=1761234537" type="image/jpeg" length="113988"/>
    </item>
  </channel>
</rss>
