<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security &amp; Business Resilience</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: gorodenkoff (iStock / Getty Images Plus)</em></p>

<p>Explore strategies and solutions for security business resilience to ensure organizational continuity, risk mitigation, and recovery from disruptions.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2230-security-business-resilience</link>
    <language>en-us</language>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1775142497" type="image/png" length="470607"/>
    </item>
    <item>
      <title>Taming the Threat Beast: Building a Threat-Led Cybersecurity Program</title>
      <description>
        <![CDATA[<p>Moving from noisy threat feeds to focused intelligence that security teams can actually act on.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102175</guid>
      <pubDate>Fri, 20 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102175-taming-the-threat-beast-building-a-threat-led-cybersecurity-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Cyber-Feat-Slide1-1170x658.webp?t=1773667443" type="image/jpeg" length="198421"/>
    </item>
    <item>
      <title>Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>What to expect as&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">the conflict between the United States and Iran unfolds.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102157</guid>
      <pubDate>Wed, 04 Mar 2026 12:00:27 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102157-iran-conflict-and-cybersecurity-what-to-expect-in-the-next-30-days</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Iran-on-map-by-mana5280.webp?t=1773279400" type="image/png" length="866822"/>
    </item>
    <item>
      <title>Why Security Teams Can No Longer Ignore Recruitment Fraud</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Recruitment sits at the intersection of brand, identity, and external engagement, yet it has historically lived outside formal security ownership.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102150</guid>
      <pubDate>Mon, 02 Mar 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102150-why-security-teams-can-no-longer-ignore-recruitment-fraud</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/27/Job-interview-by-Resume-Genius.webp?t=1773279399" type="image/png" length="418360"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>How to Protect Organizations During the Winter Olympics, According to CISOs</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>CISOs analyze Winter Olympic threats such as phishing, fraud and more.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102115</guid>
      <pubDate>Thu, 05 Feb 2026 11:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102115-how-to-protect-organizations-during-the-winter-olympics-according-to-cisos</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/05/Person-skiing-by-Maarten-Duineveld.webp?t=1770306231" type="image/png" length="614853"/>
    </item>
    <item>
      <title>Leveraging ISACA for Your CMMC Career</title>
      <description>
        <![CDATA[<p>The Cybersecurity Maturity Model Certification sets the benchmark for how DoW contractors prove cybersecurity readiness.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102105</guid>
      <pubDate>Tue, 03 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102105-leveraging-isaca-for-your-cmmc-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Cyber-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="229204"/>
    </item>
    <item>
      <title>Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging</title>
      <description>
        <![CDATA[<p>With pure exfiltration, businesses don’t realize they’re a victim until it’s too late.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102103</guid>
      <pubDate>Mon, 02 Feb 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102103-ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/30/Abstract-rendered-coding-blocks-by-Steve-Johnson.webp?t=1769788357" type="image/png" length="481443"/>
    </item>
    <item>
      <title>Securing Trust: Why Crisis Communication is Your First Line of Defense</title>
      <description>
        <![CDATA[<p>Trust is lost in minutes during a crisis, and clear, human communication is the only way to win it back.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102099</guid>
      <pubDate>Fri, 30 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102099-securing-trust-why-crisis-communication-is-your-first-line-of-defense</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Cyber-Feat-Slide1-1170x658.webp?t=1769609318" type="image/jpeg" length="49788"/>
    </item>
    <item>
      <title>The Post-Breach Narrative: Winning Back Trust After the Headlines Fade</title>
      <description>
        <![CDATA[<p>Understanding trust as a strategic asset.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102080</guid>
      <pubDate>Tue, 20 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102080-the-post-breach-narrative-winning-back-trust-after-the-headlines-fade</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Phone-with-message-icon-by-Franck.webp?t=1769044794" type="image/png" length="437381"/>
    </item>
    <item>
      <title>With New AI Executive Order, Security Burdens Shift to Users And Organizations</title>
      <description>
        <![CDATA[<p>Preparing for the future of AI regulation.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102079</guid>
      <pubDate>Mon, 19 Jan 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102079-with-new-ai-executive-order-security-burdens-shift-to-users-and-organizations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Conference-room-by-Campaign-Creators.webp?t=1769044795" type="image/png" length="529219"/>
    </item>
    <item>
      <title>Is Email the Entry Point to a Well-Rounded Disinformation Attack?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Email has always been the nervous system of business communication and is trusted, immediate and universal.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102065</guid>
      <pubDate>Thu, 08 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102065-is-email-the-entry-point-to-a-well-rounded-disinformation-attack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/brett-jordan-LPZy4da9aRo-unsplash-(1).webp?t=1769044794" type="image/jpeg" length="142611"/>
    </item>
    <item>
      <title>Sizing Up Top Tech Trends and Priorities for 2026</title>
      <description>
        <![CDATA[<p>A look into areas security professionals and digital trust practitioners should be mindful of in the year to come.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102050</guid>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102050-sizing-up-top-tech-trends-and-priorities-for-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Cyber-Feat-Slide1-1170x658.webp?t=1768469521" type="image/jpeg" length="71899"/>
    </item>
    <item>
      <title>Cybersecurity Stagnation in Healthcare: The Hidden Financial Costs</title>
      <description>
        <![CDATA[<p>Rising breach costs and the financial impact of program immaturity.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102060</guid>
      <pubDate>Tue, 23 Dec 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102060-cybersecurity-stagnation-in-healthcare-the-hidden-financial-costs</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/22/Rendered-heart-monitors-by-MW.webp?t=1766419102" type="image/png" length="772318"/>
    </item>
    <item>
      <title>Louder Than Words: How Effective Security Defends Brand Reputation</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders can help defend their organization’s reputation through proper protective measures.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102045</guid>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102045-louder-than-words-how-effective-security-defends-brand-reputation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-F3-Feat-Slide1-1170x658.webp?t=1766527867" type="image/jpeg" length="46599"/>
    </item>
    <item>
      <title>The Most Dangerous 6 Weeks of the Year</title>
      <description>
        <![CDATA[<p>Attackers are planning around your holidays. The question is whether you’ve done the same.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102040</guid>
      <pubDate>Thu, 11 Dec 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102040-the-most-dangerous-6-weeks-of-the-year</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/10/Calendar-with-pins-by-Towfiqu-barbhuiya.webp?t=1765382355" type="image/png" length="233997"/>
    </item>
    <item>
      <title>A Lack of AI Governance Leads to Additional Security Risks</title>
      <description>
        <![CDATA[<p>Security leaders need concrete AI guidelines to prevent risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102037</guid>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102037-a-lack-of-ai-governance-leads-to-additional-security-risks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-News1-Feat-Slide1-1170x658.webp?t=1765295964" type="image/jpeg" length="107871"/>
    </item>
    <item>
      <title>The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology</title>
      <author>edfinkel@earthlink.net (Ed Finkel)</author>
      <description>
        <![CDATA[<p>Security executives and guarding companies identify trends in security guarding throughout 2025, from political, executive protection challenges, violence, and theft.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102023</guid>
      <pubDate>Mon, 01 Dec 2025 07:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102023-the-2025-annual-guarding-report-unrest-inspires-upgrades-in-training-technology</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-F1-HERO-Slide-1440x750.webp?t=1766527866" type="image/jpeg" length="89680"/>
    </item>
    <item>
      <title>Navigating Cybersecurity’s Tightrope: Balancing Skills, AI, and Human Resilience</title>
      <description>
        <![CDATA[<p>A walk through for running a successful test that turns lessons into lasting resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102015</guid>
      <pubDate>Wed, 26 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102015-navigating-cybersecuritys-tightrope-balancing-skills-ai-and-human-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Cyber-Feat-Slide1-1170x658.webp?t=1763574175" type="image/jpeg" length="28026"/>
    </item>
    <item>
      <title>Inside The 2025 Security Benchmark Report</title>
      <description>
        <![CDATA[<p>Rachelle Blair-Frasier, Editor in Chief at <em>Security</em> magazine, presents a selection of findings from The 2025 Security Benchmark Report.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102009</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102009-inside-the-2025-security-benchmark-report</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Talk-Feat-Slide1-1170x658.webp?t=1763047752" type="image/jpeg" length="83767"/>
    </item>
    <item>
      <title>Cyber Insurance Comes of Age: From Niche Policy to Strategic Risk Tool</title>
      <description>
        <![CDATA[<p>The global cyber insurance market is still maturing, uneven in its reach, and sometimes misunderstood in its value.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102007</guid>
      <pubDate>Thu, 13 Nov 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102007-cyber-insurance-comes-of-age-from-niche-policy-to-strategic-risk-tool</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/12/Chess-board-by-Felix-Mittermeier.webp?t=1762960583" type="image/png" length="236726"/>
    </item>
    <item>
      <title>You’re In Charge: Can You Keep the Business Running?</title>
      <description>
        <![CDATA[<p>This experience is designed for business continuity, IT, and security leaders who want to see how their choices shape response and resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102002</guid>
      <pubDate>Tue, 11 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102002-youre-in-charge-can-you-keep-the-business-running</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Sponsored-Content/everbridge/Choose-Your-Own-Crisis-Adventure.webp?t=1762808209" type="image/png" length="553860"/>
    </item>
    <item>
      <title>PredictiveAI Security: Guarding the Intelligence Behind the GenAI Spotlight</title>
      <description>
        <![CDATA[<p>Why <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">—</span> and how <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">—</span>
predictive AI should be governed.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101977</guid>
      <pubDate>Tue, 28 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101977-predictiveai-security-guarding-the-intelligence-behind-the-genai-spotlight</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/27/AI-computer-chip-by-Immo-Wegmann.webp?t=1761578073" type="image/png" length="754546"/>
    </item>
    <item>
      <title>The Moment of Truth: Conducting Your BCP Test and Capturing Lessons</title>
      <description>
        <![CDATA[<p>A walk through for running a successful test that turns lessons into lasting resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101973</guid>
      <pubDate>Mon, 27 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101973-the-moment-of-truth-conducting-your-bcp-test-and-capturing-lessons</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-Cyber-Feat-Slide1-1170x658.webp?t=1761234537" type="image/jpeg" length="113988"/>
    </item>
    <item>
      <title>Cyber Resilience Now: Why 2025 Demands a Shift from Defense to Readiness</title>
      <description>
        <![CDATA[<p>October is National Cybersecurity Awareness month, and this year’s focus feels more urgent than ever as cyber warfare enters a new phase.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101958</guid>
      <pubDate>Tue, 14 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101958-cyber-resilience-now-why-2025-demands-a-shift-from-defense-to-readiness</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/13/Blue-lightbulb-by-Nick-Fewings.webp?t=1760364842" type="image/png" length="561519"/>
    </item>
    <item>
      <title>Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response</title>
      <description>
        <![CDATA[<p>Most organizations today aren’t short on alerts. The real problem is what comes next.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101952</guid>
      <pubDate>Wed, 08 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101952-why-a-unified-view-across-it-continuity-and-security-makes-or-breaks-crisis-response</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/Sponsored-Content/Everbridge/critical-event-management.webp?t=1759855120" type="image/jpeg" length="95581"/>
    </item>
    <item>
      <title>Building Bridges: Overcoming Silos to Bring Organizations to the Next Level</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Poor visibility can leave organizations vulnerable, which is why it is time for companies to bridge internal silos.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101940</guid>
      <pubDate>Thu, 02 Oct 2025 07:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101940-building-bridges-overcoming-silos-to-bring-organizations-to-the-next-level</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-F1-Feat-Slide1-1170x658.webp?t=1761294785" type="image/jpeg" length="89855"/>
    </item>
    <item>
      <title>Cybersecurity Awareness Month Is a Reminder: Phishing Prevention Is Year-Round</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Cybersecurity Awareness Month reminds organizations to make recognizing and reporting phishing a priority, but it’s not a once-a-year effort.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101935</guid>
      <pubDate>Wed, 01 Oct 2025 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101935-cybersecurity-awareness-month-is-a-reminder-phishing-prevention-is-year-round</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/25/Two-people-working-together-by-charlesdeluvio.webp?t=1758822493" type="image/png" length="269033"/>
    </item>
    <item>
      <title>The BCP Proving Ground: A Blueprint for a Successful Test</title>
      <description>
        <![CDATA[<p>Test the BCP to ensure the process is organized, insightful and strengthens crisis response capabilities.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101929</guid>
      <pubDate>Fri, 26 Sep 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101929-the-bcp-proving-ground-a-blueprint-for-a-successful-test</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/09-September/SEC-0925-Cyber-Feat-Slide1-1170x658.webp?t=1758720617" type="image/jpeg" length="78681"/>
    </item>
    <item>
      <title>Preparing for a Quantum Future</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em> Magazine, Director of Digital Security Solutions Marketing at Entrust Samantha Mabey discusses how organizations can prepare for a quantum future.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101914</guid>
      <pubDate>Wed, 24 Sep 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101914-preparing-for-a-quantum-future</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/17/Mabey-podcast-news-header.webp?t=1758121161" type="image/png" length="129187"/>
    </item>
  </channel>
</rss>
