<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Education &amp; Training</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: EvgeniyShkolenko (iStock / Getty Images Plus)</em></p>

<p>Discover the latest in security education and training, featuring programs, certifications, and resources to enhance skills and knowledge in the security field.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2614-security-education-training</link>
    <language>en-us</language>
    <item>
      <title>Discussing Use of Force in Security: A Challenging Discussion?</title>
      <description>
        <![CDATA[<p>Some may consider the use of force in security to be a challenging discussion, but it must be had in order to improve functionally and ethically.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102161</guid>
      <pubDate>Fri, 13 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102161-discussing-use-of-force-in-security-a-challenging-discussion</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Edu-Feat-Slide1-1170x658.webp?t=1772810452" type="image/jpeg" length="94254"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>Critical Thinking Erosion: A Hidden Threat to Security Career Resilience</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>While cybersecurity is vital, it is only one piece of the larger security puzzle.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102117</guid>
      <pubDate>Mon, 16 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102117-critical-thinking-erosion-a-hidden-threat-to-security-career-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Career-Feat-Slide1-1170x658.webp?t=1772041699" type="image/jpeg" length="153150"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>What Background Checks Miss: The Human Layer Behind Modern Screening</title>
      <description>
        <![CDATA[<p>As background checks become more standard, they can run the risk of becoming less thorough.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102083</guid>
      <pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102083-what-background-checks-miss-the-human-layer-behind-modern-screening</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Edu-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="66133"/>
    </item>
    <item>
      <title>Private Sector Intelligence Careers</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>As corporate intelligence roles grow, gaps in analytic tradecraft education highlight the need for structured thinking and decision-support training.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102073</guid>
      <pubDate>Mon, 19 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102073-private-sector-intelligence-careers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Career-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="110926"/>
    </item>
    <item>
      <title>Escape Rooms, Mud Runs, and Game Nights: Cradles of Leadership?</title>
      <description>
        <![CDATA[<p>What team-building games can teach us about real leadership.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102072</guid>
      <pubDate>Fri, 16 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102072-escape-rooms-mud-runs-and-game-nights-cradles-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Leadership-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="121518"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
    <item>
      <title>Cybercrime Economics: AI’s Impact and How to Shift Defenses</title>
      <description>
        <![CDATA[<p>AI changed the economics of cybercrime. In 2026, defenses must change with it.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102056</guid>
      <pubDate>Wed, 31 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102056-cybercrime-economics-ais-impact-and-how-to-shift-defenses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Rendered-computer-with-coding-by-Growtika.webp?t=1766163379" type="image/png" length="281882"/>
    </item>
    <item>
      <title>Human Oversight Is the Missing Link in GenAI Trust</title>
      <description>
        <![CDATA[<p>Human oversight will determine when genAI becomes enterprise-grade.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102048</guid>
      <pubDate>Tue, 16 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102048-human-oversight-is-the-missing-link-in-genai-trust</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/15/AI-chip-up-close-by-Igor-Omilaev.webp?t=1765818573" type="image/png" length="445428"/>
    </item>
    <item>
      <title>The Gift of Leadership</title>
      <description>
        <![CDATA[<p>Security leaders discuss inspiring others through the gift of leadership this holiday season.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102042</guid>
      <pubDate>Mon, 15 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102042-the-gift-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Leadership-Feat-Slide1-1170x658.webp?t=1766527868" type="image/jpeg" length="35588"/>
    </item>
    <item>
      <title>2025 Corporate Security Job Market Shifts</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Adaptability is the foundation of resilience, both for corporate security programs and for individual security careers.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102041</guid>
      <pubDate>Fri, 12 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102041-2025-corporate-security-job-market-shifts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Career-Feat-Slide1-1170x658.webp?t=1766527867" type="image/jpeg" length="63676"/>
    </item>
    <item>
      <title>How Does Metadata Help in Digital Forensic Investigations?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Metadata proves to be a powerful ally in digital forensics investigations.</span>
</p><br><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102019</guid>
      <pubDate>Tue, 25 Nov 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102019-how-does-metadata-help-in-digital-forensic-investigations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/24/Magnifying-glass-over-laptop-by-Agence-Olloweb.webp?t=1764812378" type="image/png" length="332543"/>
    </item>
    <item>
      <title>Inside The 2025 Security Benchmark Report</title>
      <description>
        <![CDATA[<p>Rachelle Blair-Frasier, Editor in Chief at <em>Security</em> magazine, presents a selection of findings from The 2025 Security Benchmark Report.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102009</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102009-inside-the-2025-security-benchmark-report</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Talk-Feat-Slide1-1170x658.webp?t=1763047752" type="image/jpeg" length="83767"/>
    </item>
    <item>
      <title>Mind the GAP</title>
      <description>
        <![CDATA[<p>Six principles every security leader should remember when plans derail.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102004</guid>
      <pubDate>Mon, 17 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102004-mind-the-gap</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Leadership-Feat-Slide1-1170x658.webp?t=1762870037" type="image/jpeg" length="166648"/>
    </item>
    <item>
      <title>Security Job Postings and Pay Transparency Laws</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Compliance with pay transparency requirements is essential to responsible recruitment practices and risk management.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102003</guid>
      <pubDate>Fri, 14 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102003-security-job-postings-and-pay-transparency-laws</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-0925-Career-Feat-Slide1-1170x658.webp?t=1762869315" type="image/jpeg" length="92739"/>
    </item>
    <item>
      <title>Bringing AI to The SOC Is Not Intended to Replace Humans</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI in the SOC is showing true promise because it abandons the rigid, rules-based approaches of the past and embraces autonomous reasoning and continuous learning capabilities that have not been previously available.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101999</guid>
      <pubDate>Tue, 11 Nov 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101999-bringing-ai-to-the-soc-is-not-intended-to-replace-humans</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/10/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1762789612" type="image/png" length="201182"/>
    </item>
    <item>
      <title>Stepping Into Enterprise Security: How Public Safety Professionals Can Stand Out and Land Their First Role</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>This is a difficult year for professionals looking to shift from public safety to enterprise security, but with proper preparation, the move is possible.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101995</guid>
      <pubDate>Fri, 07 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101995-stepping-into-enterprise-security-how-public-safety-professionals-can-stand-out-and-land-their-first-role</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Edu-Feat-Slide1-1170x658.webp?t=1763157543" type="image/jpeg" length="87786"/>
    </item>
    <item>
      <title>Inside SECURITY 500: Reinventing Security Leadership</title>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em>Magazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference.
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101986</guid>
      <pubDate>Wed, 05 Nov 2025 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101986-inside-security-500-reinventing-security-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/05/SEC-Podcast-Header-11.5.25-Will-Bernhjelm.webp?t=1762363021" type="image/png" length="118979"/>
    </item>
    <item>
      <title>Determining the Credibility of Online Threats in a World of Digital Noise</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While many online threats are nothing more than idle chatter, pranks, or cries for attention, others are chillingly real — and the challenge is determining which is which before tragedy strikes.</span>
</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101983</guid>
      <pubDate>Thu, 30 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101983-determining-the-credibility-of-online-threats-in-a-world-of-digital-noise</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/29/Stressed-woman-at-laptop-by-Elisa-Ventur.webp?t=1772041697" type="image/png" length="446361"/>
    </item>
    <item>
      <title>A Glimpse of the Future: How AI Will Transform Physical Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Steve Lindsey, CTO and Co-Founder of LVT, shares his insights regarding the future of AI in physical security. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101979</guid>
      <pubDate>Wed, 29 Oct 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101979-a-glimpse-of-the-future-how-ai-will-transform-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/27/Lindsey-podcast-news-header.webp?t=1761584111" type="image/png" length="139280"/>
    </item>
    <item>
      <title>PredictiveAI Security: Guarding the Intelligence Behind the GenAI Spotlight</title>
      <description>
        <![CDATA[<p>Why <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">—</span> and how <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">—</span>
predictive AI should be governed.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101977</guid>
      <pubDate>Tue, 28 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101977-predictiveai-security-guarding-the-intelligence-behind-the-genai-spotlight</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/27/AI-computer-chip-by-Immo-Wegmann.webp?t=1761578073" type="image/png" length="754546"/>
    </item>
    <item>
      <title>AI Agents and Holiday Travel: A New Fraud Frontier</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Travel platforms must evolve from reactive fraud blocking to proactive management.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101962</guid>
      <pubDate>Fri, 17 Oct 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101962-ai-agents-and-holiday-travel-a-new-fraud-frontier</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/16/Airport-baggage-check-by-Phil-Mosley.webp?t=1760624899" type="image/png" length="593724"/>
    </item>
    <item>
      <title>Going Down with the Ship</title>
      <description>
        <![CDATA[<p>Three security executives offer insights from their own turbulent voyages.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101950</guid>
      <pubDate>Fri, 17 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101950-going-down-with-the-ship</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-Leadership-Feat-Slide1-1170x658.webp?t=1761294786" type="image/jpeg" length="74368"/>
    </item>
    <item>
      <title>Future Proof Your Security Career with AI Skills</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>AI’s evolution demands security leaders master integration and use of emerging tools.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101949</guid>
      <pubDate>Wed, 15 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101949-future-proof-your-security-career-with-ai-skills</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-Career-Feat-Slide1-1170x658.webp?t=1761294786" type="image/jpeg" length="45234"/>
    </item>
    <item>
      <title>Help Desk Havoc: Why Identity Verification Is Still the Weakest Link in Targeted Attacks</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Help desks are often the first line of defense for malicious identity verification activity, yet are among the most under-protected entry points in the enterprise.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101955</guid>
      <pubDate>Fri, 10 Oct 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101955-help-desk-havoc-why-identity-verification-is-still-the-weakest-link-in-targeted-attacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/09/Help-desk-employees-by-Charanjeet-Dhiman.webp?t=1760018802" type="image/png" length="444852"/>
    </item>
  </channel>
</rss>
