<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Enterprise Services</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: gorodenkoff (iStock / Getty Images Plus)</em></p>

<p>Discover comprehensive security enterprise services, including risk management, consulting, and integrated solutions to safeguard organizations at scale.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2231</link>
    <language>en-us</language>
    <item>
      <title>Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Training programs provide essential baseline knowledge, b<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ut training alone does not make someone proficient.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102200</guid>
      <pubDate>Thu, 02 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102200-beyond-the-certificate-why-real-expertise-in-investigative-interviewing-comes-from-practice</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/01/Interview-by-Vitaly-Gariev.webp?t=1775680874" type="image/png" length="347211"/>
    </item>
    <item>
      <title>The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats</title>
      <description>
        <![CDATA[<p>The corporate world has witnessed a dramatic shift in how companies safeguard their top leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102199</guid>
      <pubDate>Wed, 01 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102199-the-rising-tide-of-executive-protection-corporations-ramp-up-security-in-an-era-of-heightened-threats</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/31/Man-walking-with-briefcase-by-Marten-Bjork.webp?t=1774983008" type="image/png" length="369171"/>
    </item>
    <item>
      <title>Beyond Locking Doors</title>
      <description>
        <![CDATA[<p>How access control data can support operational improvements.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102197</guid>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102197-beyond-locking-doors</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F3-Feat-Slide1-1170x658.webp?t=1775680876" type="image/jpeg" length="75767"/>
    </item>
    <item>
      <title>Document Protection: Why Hybrid Storage Is the Future of Security </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Strategically choose which data lives on a server and which lives physically.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102177</guid>
      <pubDate>Tue, 17 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102177-document-protection-why-hybrid-storage-is-the-future-of-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Open-filing-cabinet-by-Maksym-Kaharlytskyi.webp?t=1773670622" type="image/png" length="473786"/>
    </item>
    <item>
      <title>Cracking Cyber’s Talent Gap Challenge</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Solving the cybersecurity workforce challenge requires a shift in perspective.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102169</guid>
      <pubDate>Thu, 12 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102169-cracking-cybers-talent-gap-challenge</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/11/We-are-hiring-sign-by-Eric-Prouzet.webp?t=1773243878" type="image/png" length="597497"/>
    </item>
    <item>
      <title>Why Security Culture Metrics Matter More Than Dashboards</title>
      <description>
        <![CDATA[<p>Traditional metrics can be valuable, but they don’t tell the whole story. To truly understand the bigger picture of an organization’s security posture, leaders need to consider “culture metrics.”</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102160</guid>
      <pubDate>Wed, 11 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102160-why-security-culture-metrics-matter-more-than-dashboards</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F4-Feat-Slide1-1170x658.webp?t=1772809236" type="image/jpeg" length="92600"/>
    </item>
    <item>
      <title>Security Insights Delivered Through Podcasts</title>
      <description>
        <![CDATA[<p>Listen in as security leaders discuss professional and personal stories from their security careers in episodes of Lock It Down with <em>Security</em>.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102118</guid>
      <pubDate>Wed, 18 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102118-security-insights-delivered-through-podcasts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Talk-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="210972"/>
    </item>
    <item>
      <title>The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines</title>
      <description>
        <![CDATA[<p>Internal AI assistants are&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">a new class of exposure that most organizations are unprepared to manage.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102126</guid>
      <pubDate>Tue, 17 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102126-the-copilot-problem-why-internal-ai-assistants-are-becoming-accidental-data-breach-engines</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/16/Man-coding-by-KeepCoding.webp?t=1771464182" type="image/png" length="320974"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Privilege Disruption: The Key Choke Point for Cyber Deterrence</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The government and private sector alike must recognize the importance of privilege disruption.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102111</guid>
      <pubDate>Wed, 04 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102111-privilege-disruption-the-key-choke-point-for-cyber-deterrence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/03/Computer-and-laptop-by-Mamur-Saitbaev.webp?t=1770144049" type="image/png" length="235318"/>
    </item>
    <item>
      <title>The Post-Breach Narrative: Winning Back Trust After the Headlines Fade</title>
      <description>
        <![CDATA[<p>Understanding trust as a strategic asset.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102080</guid>
      <pubDate>Tue, 20 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102080-the-post-breach-narrative-winning-back-trust-after-the-headlines-fade</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Phone-with-message-icon-by-Franck.webp?t=1769044794" type="image/png" length="437381"/>
    </item>
    <item>
      <title>Key Signs of Mental Health Struggles in Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>John Rodriguez, Founder of Empathic Security Cultures LLC, shares why mental health is so crucial in security.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102051</guid>
      <pubDate>Wed, 17 Dec 2025 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102051-key-signs-of-mental-health-struggles-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/16/Rodriguez-podcast-news-header.webp?t=1765904778" type="image/png" length="137029"/>
    </item>
    <item>
      <title>Inside New Orleans’ Real Time Crime Center</title>
      <description>
        <![CDATA[<p>Director Ross Bourgeois explains how New Orleans built a 24/7 real time crime center that fuses video, CAD, LPR, and strict governance.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102044</guid>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102044-inside-new-orleans-real-time-crime-center</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Talk-Slide2-1170x658.webp?t=1766527867" type="image/jpeg" length="155327"/>
    </item>
    <item>
      <title>Human Oversight Is the Missing Link in GenAI Trust</title>
      <description>
        <![CDATA[<p>Human oversight will determine when genAI becomes enterprise-grade.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102048</guid>
      <pubDate>Tue, 16 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102048-human-oversight-is-the-missing-link-in-genai-trust</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/15/AI-chip-up-close-by-Igor-Omilaev.webp?t=1765818573" type="image/png" length="445428"/>
    </item>
    <item>
      <title>Inside The 2025 Security Benchmark Report</title>
      <description>
        <![CDATA[<p>Rachelle Blair-Frasier, Editor in Chief at <em>Security</em> magazine, presents a selection of findings from The 2025 Security Benchmark Report.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102009</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102009-inside-the-2025-security-benchmark-report</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Talk-Feat-Slide1-1170x658.webp?t=1763047752" type="image/jpeg" length="83767"/>
    </item>
    <item>
      <title>Panelists Return to SECURITY 500 to Discuss Navigating Tough Decisions</title>
      <author></author>
      <description>
        <![CDATA[<p>In an&nbsp;interactive SECURITY 500 panel, security leaders will contemplate high-stakes “Would You Rather” scenarios to reflect the real-world complications they face each day.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101989</guid>
      <pubDate>Fri, 07 Nov 2025 06:21:17 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101989-panelists-return-to-security-500-to-discuss-navigating-tough-decisions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/06/Copy-of-SEC-500-Panel-header-(5).webp?t=1762442399" type="image/png" length="196211"/>
    </item>
    <item>
      <title>Panelists to Discuss Crisis Management When Threats Overlap</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The “Crisis Leadership in the Age of Polycrisis” panel at the 2025 SECURITY 500 Conference will feature security leaders discussing the intricacies of crisis management when threats overlap.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101988</guid>
      <pubDate>Thu, 06 Nov 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101988-panelists-to-discuss-crisis-management-when-threats-overlap</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/04/Copy-of-SEC-500-Panel-header-(4).webp?t=1762272533" type="image/png" length="176956"/>
    </item>
    <item>
      <title>The Silent Insider Threat: When Employees Undermine Cybersecurity Messaging</title>
      <description>
        <![CDATA[<p>One of the most damaging vulnerabilities often sits inside the organization: inconsistent communication from employees.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101993</guid>
      <pubDate>Thu, 06 Nov 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101993-the-silent-insider-threat-when-employees-undermine-cybersecurity-messaging</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/05/Pile-of-block-letters-by-Sven-Brandsma.webp?t=1762354577" type="image/png" length="435865"/>
    </item>
    <item>
      <title>Inside SECURITY 500: Reinventing Security Leadership</title>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em>Magazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference.
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101986</guid>
      <pubDate>Wed, 05 Nov 2025 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101986-inside-security-500-reinventing-security-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/05/SEC-Podcast-Header-11.5.25-Will-Bernhjelm.webp?t=1762363021" type="image/png" length="118979"/>
    </item>
    <item>
      <title>Panelists to Discuss Public-Private Partnerships at SECURITY 500 Conference</title>
      <author></author>
      <description>
        <![CDATA[<p>Security leaders will discuss the impact that public-private partnerships have on community security and public safety.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101985</guid>
      <pubDate>Tue, 04 Nov 2025 04:13:24 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101985-panelists-to-discuss-public-private-partnerships-at-security-500-conference</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/03/Copy-of-SEC-500-Panel-header-(3).webp?t=1762182798" type="image/png" length="185809"/>
    </item>
    <item>
      <title>The Power of Mentorship in Shaping Security</title>
      <description>
        <![CDATA[<p>Top security leaders share how mentorship shaped their paths to success.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101944</guid>
      <pubDate>Tue, 07 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101944-the-power-of-mentorship-in-shaping-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-Talk-Feat-Slide1-1170x658.webp?t=1759166817" type="image/jpeg" length="38604"/>
    </item>
    <item>
      <title>How AI and Virtual Operators Are Transforming Security Operations</title>
      <author></author>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security&nbsp;</em>Magazine, Simon Morgan, Chief Product Officer at SureView Systems, discusses the evolution of security operations and the rise of artificial intelligence in modern SOCs.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101889</guid>
      <pubDate>Wed, 17 Sep 2025 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101889-how-ai-and-virtual-operators-are-transforming-security-operations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/08/Simon-Morgan-Podcast-header.webp?t=1757347045" type="image/jpeg" length="57494"/>
    </item>
    <item>
      <title>Celebrating 40 Years with OSAC</title>
      <author></author>
      <description>
        <![CDATA[<p>In this episode of The <em>Security</em> Podcasts we sit down with Jerry Tavares, Executive Director of OSAC to talk a bit about OSAC’s mission and trends in the industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101733</guid>
      <pubDate>Wed, 23 Jul 2025 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101733-celebrating-40-years-with-osac</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/07/24/Jerry-J.-Tavares-OSAC-Podcast-Header-NEW.webp?t=1754533269" type="image/png" length="118246"/>
    </item>
    <item>
      <title>Deadline Nears for 2025 Elliot A. Boxerbaum Award Nominations</title>
      <author></author>
      <description>
        <![CDATA[<p>Applications are now open for the 2025 Elliot A. Boxerbaum Award for the Security Design Project of the Year. This award given each year for excellence in security design. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101779</guid>
      <pubDate>Thu, 17 Jul 2025 10:50:37 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101779-deadline-nears-for-2025-elliot-a-boxerbaum-award-nominations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/28/Boxerbaum-2024.webp?t=1730133040" type="image/png" length="453639"/>
    </item>
    <item>
      <title>Security’s 2025 Women in Security</title>
      <description>
        <![CDATA[<p>This year’s Women in Security honorees drive meaningful change within their organizations and help to shape the future of the security industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101739</guid>
      <pubDate>Mon, 07 Jul 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101739-securitys-2025-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/07-July/SEC-0725-F1-Intro-HERO-Slide-1440x750.webp?t=1752147912" type="image/jpeg" length="120564"/>
    </item>
    <item>
      <title>A New Way to Think About Metrics in Security Operations</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">As the security field evolves, so too must the approach to metrics.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101724</guid>
      <pubDate>Fri, 27 Jun 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101724-a-new-way-to-think-about-metrics-in-security-operations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/06/26/Metrics-on-a-screen-by-Luke-Chesser.webp?t=1750943821" type="image/png" length="373701"/>
    </item>
    <item>
      <title>Conducting Background Checks in the Corporate Security Environment</title>
      <description>
        <![CDATA[<p>As data privacy grows stronger, it becomes harder for security leaders to perform thorough background checks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101668</guid>
      <pubDate>Fri, 06 Jun 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101668-conducting-background-checks-in-the-corporate-security-environment</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/06-June/SEC-0625-Edu-Feat-Slide1-1170x658.webp?t=1749783377" type="image/jpeg" length="124361"/>
    </item>
    <item>
      <title>Why Visitor and Contractor Management is Critical in Busy Facilities</title>
      <description>
        <![CDATA[<p>Though essential to daily operations, temporary populations can become a security blind spot.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101666</guid>
      <pubDate>Wed, 04 Jun 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101666-why-visitor-and-contractor-management-is-critical-in-busy-facilities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/06-June/SEC-0625-F2-Feat-Slide1-1170x658.webp?t=1749783377" type="image/jpeg" length="72626"/>
    </item>
    <item>
      <title>The Important Role of Automated Notification Systems in an Effective Security Solution</title>
      <description>
        <![CDATA[<p>Effectiveness of automated notification systems largely depends on the integration with other security measures.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101595</guid>
      <pubDate>Mon, 05 May 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101595-the-important-role-of-automated-notification-systems-in-an-effective-security-solution</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/05-May/SEC-0525-F2-Feat-Slide1-1170x658.webp?t=1746193223" type="image/jpeg" length="58998"/>
    </item>
    <item>
      <title>Amidst Tariff Uncertainty, Physical Security Can’t Take a Backseat</title>
      <description>
        <![CDATA[<p>As tariff uncertainty swirls,&nbsp;businesses may be at greater risk for theft and vandalism.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101558</guid>
      <pubDate>Tue, 22 Apr 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101558-amidst-tariff-uncertainty-physical-security-cant-take-a-backseat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/04/21/Cargo-ship-sailing-by-Venti-Views.webp?t=1745664879" type="image/png" length="654734"/>
    </item>
  </channel>
</rss>
