<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cyber Tactics Column</title>
    <description>
      <![CDATA[Columnist and cybersecurity leader John McClurg guides CISOs through cybersecurity standards, information security tools, security frameworks and risk management techniques.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2654</link>
    <language>en-us</language>
    <item>
      <title>Taming the Threat Beast: Building a Threat-Led Cybersecurity Program</title>
      <description>
        <![CDATA[<p>Moving from noisy threat feeds to focused intelligence that security teams can actually act on.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102175</guid>
      <pubDate>Fri, 20 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102175-taming-the-threat-beast-building-a-threat-led-cybersecurity-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Cyber-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="198421"/>
    </item>
    <item>
      <title>Leveraging ISACA for Your CMMC Career</title>
      <description>
        <![CDATA[<p>The Cybersecurity Maturity Model Certification sets the benchmark for how DoW contractors prove cybersecurity readiness.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102105</guid>
      <pubDate>Tue, 03 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102105-leveraging-isaca-for-your-cmmc-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Cyber-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="229204"/>
    </item>
    <item>
      <title>Securing Trust: Why Crisis Communication is Your First Line of Defense</title>
      <description>
        <![CDATA[<p>Trust is lost in minutes during a crisis, and clear, human communication is the only way to win it back.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102099</guid>
      <pubDate>Fri, 30 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102099-securing-trust-why-crisis-communication-is-your-first-line-of-defense</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Cyber-Feat-Slide1-1170x658.webp?t=1769609318" type="image/jpeg" length="49788"/>
    </item>
    <item>
      <title>Sizing Up Top Tech Trends and Priorities for 2026</title>
      <description>
        <![CDATA[<p>A look into areas security professionals and digital trust practitioners should be mindful of in the year to come.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102050</guid>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102050-sizing-up-top-tech-trends-and-priorities-for-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Cyber-Feat-Slide1-1170x658.webp?t=1768469521" type="image/jpeg" length="71899"/>
    </item>
    <item>
      <title>Navigating Cybersecurity’s Tightrope: Balancing Skills, AI, and Human Resilience</title>
      <description>
        <![CDATA[<p>A walk through for running a successful test that turns lessons into lasting resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102015</guid>
      <pubDate>Wed, 26 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102015-navigating-cybersecuritys-tightrope-balancing-skills-ai-and-human-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Cyber-Feat-Slide1-1170x658.webp?t=1763574175" type="image/jpeg" length="28026"/>
    </item>
    <item>
      <title>The Moment of Truth: Conducting Your BCP Test and Capturing Lessons</title>
      <description>
        <![CDATA[<p>A walk through for running a successful test that turns lessons into lasting resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101973</guid>
      <pubDate>Mon, 27 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101973-the-moment-of-truth-conducting-your-bcp-test-and-capturing-lessons</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-Cyber-Feat-Slide1-1170x658.webp?t=1761234537" type="image/jpeg" length="113988"/>
    </item>
    <item>
      <title>The BCP Proving Ground: A Blueprint for a Successful Test</title>
      <description>
        <![CDATA[<p>Test the BCP to ensure the process is organized, insightful and strengthens crisis response capabilities.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101929</guid>
      <pubDate>Fri, 26 Sep 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101929-the-bcp-proving-ground-a-blueprint-for-a-successful-test</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/09-September/SEC-0925-Cyber-Feat-Slide1-1170x658.webp?t=1758720617" type="image/jpeg" length="78681"/>
    </item>
    <item>
      <title>Your Mid-Year BCP Wake-Up Call: Is Your Business Ready?</title>
      <description>
        <![CDATA[<p>A Business Continuity Plan is a silent safety net, but it requires regular maintenance.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101828</guid>
      <pubDate>Wed, 27 Aug 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101828-your-mid-year-bcp-wake-up-call-is-your-business-ready</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/08-August/SEC-0825-Cyber-Feat-Slide1-1170x658.webp?t=1755010662" type="image/jpeg" length="81974"/>
    </item>
    <item>
      <title>Securing the Digital Frontier: Strategies for Safeguarding Companies and Customers in the Age of Wearables</title>
      <description>
        <![CDATA[<p>Adapting frameworks to encompass emerging risks associated with the latest wearable trends is essential.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101784</guid>
      <pubDate>Thu, 31 Jul 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101784-securing-the-digital-frontier-strategies-for-safeguarding-companies-and-customers-in-the-age-of-wearables</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/07-July/SEC-0725-Cyber-Feat-Slide1-1170x658.webp?t=1752767436" type="image/jpeg" length="81999"/>
    </item>
    <item>
      <title>Quantum Computing: A Call to Action for Security Professionals</title>
      <description>
        <![CDATA[<p>There are significant security challenges and opportunities ahead in the era of quantum computing.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101718</guid>
      <pubDate>Wed, 25 Jun 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101718-quantum-computing-a-call-to-action-for-security-professionals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/06-June/SEC-0625-Cyber-Feat-Slide1-1170x658.webp?t=1752147913" type="image/jpeg" length="92508"/>
    </item>
    <item>
      <title>The Critical Role of Mean Time to Remediate</title>
      <description>
        <![CDATA[<p>Every minute shaved off the remediation process translates to reduced risk and a stronger, more resilient organization.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101647</guid>
      <pubDate>Wed, 28 May 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101647-the-critical-role-of-mean-time-to-remediate</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/05-May/SEC-0525-Cyber-Feat-Slide1-1170x658.webp?t=1748011476" type="image/jpeg" length="151727"/>
    </item>
    <item>
      <title>Building a robust cybersecurity team: Five essential roles and key certifications</title>
      <description>
        <![CDATA[<p>Assembling a robust cybersecurity team is essential for protecting an organization’s information assets.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101536</guid>
      <pubDate>Mon, 14 Apr 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101536-building-a-robust-cybersecurity-team-five-essential-roles-and-key-certifications</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/04-April/SEC-0425-Cyber-Feat-Slide1-1170x658.webp?t=1744380912" type="image/jpeg" length="75024"/>
    </item>
    <item>
      <title>The fundamentals of cybersecurity in the age of AI</title>
      <description>
        <![CDATA[<p>Advanced technologies should complement, not replace, the fundamental principles of cybersecurity.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101473</guid>
      <pubDate>Tue, 18 Mar 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101473-the-fundamentals-of-cybersecurity-in-the-age-of-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/03-March/SEC-0325-Cyber-Feat-Slide1-1170x658.webp?t=1741972241" type="image/jpeg" length="156460"/>
    </item>
    <item>
      <title>How security professionals can stand out in a tighter market</title>
      <description>
        <![CDATA[<p>Staying proactive, adaptable and continuously learning are key to stand out and achieve career success in cybersecurity.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101363</guid>
      <pubDate>Thu, 13 Feb 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101363-how-security-professionals-can-stand-out-in-a-tighter-market</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/02-February/SEC-0225-Cyber-Feat-Slide1-1170x658.webp?t=1739985927" type="image/jpeg" length="53642"/>
    </item>
    <item>
      <title>Prepping for your January 2025 board meeting</title>
      <description>
        <![CDATA[<p>The first board meeting of the New Year presents opportunities to effectively communicate the state of the organization's cybersecurity posture.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101296</guid>
      <pubDate>Thu, 16 Jan 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101296-prepping-for-your-january-2025-board-meeting</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/01-January/SEC-0125-Cyber-Feat-Slide1-1170x658.webp?t=1736878854" type="image/jpeg" length="55812"/>
    </item>
    <item>
      <title>Combating the rising threat of AI-powered phishing attacks</title>
      <description>
        <![CDATA[<p>To combat the rising threat of AI-powered phishing, a comprehensive strategy is crucial.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101247</guid>
      <pubDate>Mon, 16 Dec 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101247-combating-the-rising-threat-of-ai-powered-phishing-attacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/12-December/SEC-1224-Cyber-Feat-Slide1-1170x658.webp?t=1733932724" type="image/jpeg" length="135409"/>
    </item>
    <item>
      <title>Making employees your security shield</title>
      <description>
        <![CDATA[<p>Security awareness training is not just an option, but a strategic imperative.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101196</guid>
      <pubDate>Mon, 18 Nov 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101196-making-employees-your-security-shield</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/11-November/SEC-1124-Cyber-Feat-Slide1-1170x658.webp?t=1732364834" type="image/jpeg" length="57269"/>
    </item>
    <item>
      <title>State of cybersecurity: Complex threat landscape spiking stress levels</title>
      <description>
        <![CDATA[<p>ISACA's 2024 State of Cybersecurity report offers insights into the current cybersecurity landscape.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101113</guid>
      <pubDate>Mon, 14 Oct 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101113-state-of-cybersecurity-complex-threat-landscape-spiking-stress-levels</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/10-October/SEC-1024-Cyber-Feat-Slide1-1170x658.webp?t=1728313784" type="image/jpeg" length="152325"/>
    </item>
    <item>
      <title>Counteracting heightened security risks for travelers, remote workers</title>
      <description>
        <![CDATA[<p>While remote connectivity offers employees flexibility and convenience, it also opens potential avenues for breaches.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101044</guid>
      <pubDate>Mon, 16 Sep 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101044-counteracting-heightened-security-risks-for-travelers-remote-workers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/09-September/SEC-0924-Cyber-Feat-Slide1-1170x658.webp?t=1727723757" type="image/jpeg" length="85876"/>
    </item>
    <item>
      <title>Unlocking digital trust: The power of collaboration in a data-driven world</title>
      <description>
        <![CDATA[<p>As the digital landscape continues to evolve, the importance of digital trust will only continue to grow.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100920</guid>
      <pubDate>Mon, 12 Aug 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100920-unlocking-digital-trust-the-power-of-collaboration-in-a-data-driven-world</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/08-August/SEC-0824-Cyber-Feat-Slide1-1170x658.webp?t=1724459677" type="image/jpeg" length="139973"/>
    </item>
    <item>
      <title>Unlocking digital trust: The power of collaboration in a data-driven world</title>
      <description>
        <![CDATA[<p>As the digital landscape continues to evolve, the importance of digital trust will only continue to grow.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100851</guid>
      <pubDate>Mon, 15 Jul 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100851-unlocking-digital-trust-the-power-of-collaboration-in-a-data-driven-world</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/07-July/SEC-0724-Cyber-Feat-Slide1-1170x658.webp?t=1722037216" type="image/jpeg" length="83165"/>
    </item>
    <item>
      <title>Concerted push needed for AI training in security community</title>
      <description>
        <![CDATA[<p>AI has become a ubiquitous topic in boardrooms and among C-suite leaders across a range of professional disciplines — including in the security community.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100791</guid>
      <pubDate>Mon, 17 Jun 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100791-concerted-push-needed-for-ai-training-in-security-community</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/06-June/SEC-0624-Cyber-Feat-Slide1-1170x658.webp?t=1718370208" type="image/jpeg" length="76625"/>
    </item>
    <item>
      <title>Building digital trust with ISACA's framework</title>
      <description>
        <![CDATA[<p>In today's digital landscape, organizations must navigate a complex web of challenges, from cybersecurity threats and data privacy concerns to the integration of emerging technologies.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100644</guid>
      <pubDate>Mon, 13 May 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100644-building-digital-trust-with-isacas-framework</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/05-May/SEC-0524-Cyber-Feat-Slide1-1170x658.webp?t=1716646763" type="image/jpeg" length="125161"/>
    </item>
    <item>
      <title>Building cyber resilience through cyber tabletop exercises</title>
      <description>
        <![CDATA[<p>Organizations can use cyber tabletop exercises as a powerful tool to build robust and adaptable cyber defenses.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100580</guid>
      <pubDate>Mon, 15 Apr 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100580-building-cyber-resilience-through-cyber-tabletop-exercises</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/04-April/SEC-0424-Cyber-Feat-Slide1-1170x658.webp?t=1714191407" type="image/jpeg" length="62781"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2024/04-April/SEC-0424-Cyber-Feat-Slide1-1170x658.webp?t=1714191407" type="image/jpeg" medium="image" fileSize="62781">
        <media:title type="plain">Cyber lock</media:title>
        <media:description type="plain">TU IS / iStock / Getty Images Plus via Getty Images</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/November/SEC-1123-Cyber-Slide2-1170x658px.webp?t=1699553193" type="image/jpeg" medium="image" fileSize="73348">
        <media:title type="plain">Cyber Tactics - Pam Nigro</media:title>
      </media:content>
    </item>
    <item>
      <title>Tap into connection points between security and privacy</title>
      <description>
        <![CDATA[<p>Data privacy and information security are both critical components of building customer trust for organizations.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100506</guid>
      <pubDate>Thu, 14 Mar 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100506-tap-into-connection-points-between-security-and-privacy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/03-March/SEC-0324-Cyber-Feat-Slide1-1170x658.webp?t=1711833837" type="image/jpeg" length="86499"/>
    </item>
    <item>
      <title>Better software supply chain security through SBOMs</title>
      <description>
        <![CDATA[<p>n today's interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100377</guid>
      <pubDate>Mon, 12 Feb 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100377-better-software-supply-chain-security-through-sboms</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/02-February/SEC-0224-Cyber-Feat-Slide1-1170x658.webp?t=1707842049" type="image/jpeg" length="85330"/>
    </item>
    <item>
      <title>The intersection of cybersecurity and artificial intelligence</title>
      <description>
        <![CDATA[<p>Artificial intelligence (AI) is a valuable cybersecurity asset, but it's not a silver bullet. To best leverage AI, we must consider the security teams of the future.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100312</guid>
      <pubDate>Mon, 15 Jan 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100312-the-intersection-of-cybersecurity-and-artificial-intelligence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/01-January/SEC-0124-Cyber-Feat-Slide1-1170x658.webp?t=1706290396" type="image/jpeg" length="127625"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2024/01-January/SEC-0124-Cyber-Feat-Slide1-1170x658.webp?t=1706290396" type="image/jpeg" medium="image" fileSize="127625">
        <media:title type="plain">cyber brain</media:title>
        <media:description type="plain">Jackie Niam / iStock / Getty Images Plus via Getty Images</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/November/SEC-1123-Cyber-Slide2-1170x658px.webp?t=1699553193" type="image/jpeg" medium="image" fileSize="73348">
        <media:title type="plain">Cyber Tactics - Pam Nigro</media:title>
      </media:content>
    </item>
    <item>
      <title>AI security risks: Separating hype from reality</title>
      <description>
        <![CDATA[<p>By investing in artificial intelligence training and the necessary tools, security professionals can harness the power of AI to enhance their capabilities.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100219</guid>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100219-ai-security-risks-separating-hype-from-reality</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/December/SEC-1223-Cyber-Feat-Slide1-1170x658.webp?t=1701964614" type="image/jpeg" length="174198"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/December/SEC-1223-Cyber-Feat-Slide1-1170x658.webp?t=1701964614" type="image/jpeg" medium="image" fileSize="174198">
        <media:title type="plain">AI Security Risks</media:title>
        <media:description type="plain">Just_Super / iStock / Getty Images Plus via Getty Images</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/November/SEC-1123-Cyber-Slide2-1170x658px.webp?t=1699553193" type="image/jpeg" medium="image" fileSize="73348">
        <media:title type="plain">Cyber Tactics - Pam Nigro</media:title>
      </media:content>
    </item>
    <item>
      <title>Stubborn workforce challenges call for new approaches in building security teams</title>
      <description>
        <![CDATA[<p>How can we concretely address the workforce challenges facing the cybersecurity industry? In this column, Pam Nigro focuses on DEI, career development and AI.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100126</guid>
      <pubDate>Mon, 13 Nov 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100126-stubborn-workforce-challenges-call-for-new-approaches-in-building-security-teams</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/November/SEC-1123-Cyber-Feat-Slide1-1170x658.webp?t=1700666138" type="image/jpeg" length="144761"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/November/SEC-1123-Cyber-Feat-Slide1-1170x658.webp?t=1700666138" type="image/jpeg" medium="image" fileSize="144761">
        <media:title type="plain">cybersecurity teams</media:title>
        <media:description type="plain">Lorado / [iStock / Getty Images Plus via Getty Images</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/November/SEC-1123-Cyber-Slide2-1170x658px.webp?t=1699553193" type="image/jpeg" medium="image" fileSize="73348">
        <media:title type="plain">Cyber Tactics - Pam Nigro</media:title>
      </media:content>
    </item>
    <item>
      <title>Security needs to make its voice heard in AI implementations</title>
      <description>
        <![CDATA[<p>Balancing the risks and benefits of artificial intelligence (AI) is critical to enterprise cybersecurity success going forward.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99995</guid>
      <pubDate>Fri, 13 Oct 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99995-security-needs-to-make-its-voice-heard-in-ai-implementations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/October/SEC-1023-Cyber-Feat-Slide1-1170x658.webp?t=1699033223" type="image/jpeg" length="40903"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/October/SEC-1023-Cyber-Feat-Slide1-1170x658.webp?t=1699033223" type="image/jpeg" medium="image" fileSize="40903">
        <media:title type="plain">Artificial intelligence in Cybersecurity</media:title>
        <media:description type="plain">zhuweiyi49 / DigitalVision Vectors via Getty Images</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/September/SEC-0923-Cyber-Slide2-1170x658px.webp?t=1694439809" type="image/jpeg" medium="image" fileSize="73348">
        <media:title type="plain">Pam Nigro, Cyber Tactics columnist</media:title>
      </media:content>
    </item>
  </channel>
</rss>
