<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cyber Products</title>
    <description>
      <![CDATA[Check out cybersecurity defense products and services that offer threat intelligence, data security, identity and access management, endpoint detection and response, cloud and mobile security and more.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2668-cyber-products</link>
    <language>en-us</language>
    <item>
      <title>ISC West 2026 Product Preview</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a number of products that will be featured at ISC West 2026.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102165</guid>
      <pubDate>Mon, 16 Mar 2026 08:00:02 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102165-isc-west-2026-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Prods_Spot_Graphic_Header_2026_1440x750.webp?t=1773667764" type="image/jpeg" length="129750"/>
    </item>
    <item>
      <title>False positives: Mitigating concerns from cybersecurity-minded users</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">As new security risks emerge daily and the tech landscape shifts, false positives are here to stay. Security teams can use data to manage cyber risk.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100273</guid>
      <pubDate>Tue, 09 Jan 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100273-false-positives-mitigating-concerns-from-cybersecurity-minded-users</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/08/cyber-alert-(1).webp?t=1706290395" type="image/png" length="580418"/>
    </item>
    <item>
      <title>The importance of keeping backup data safe from cybercriminals</title>
      <description>
        <![CDATA[<p>Immutability and air gapping provide effective ways to outsmart cybercriminals and defend against ransomware attacks that target vital backup data.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98823</guid>
      <pubDate>Mon, 30 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98823-the-importance-of-keeping-backup-data-safe-from-cybercriminals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/24/claudio-schwarz-fyeOxvYvIyY-unsplash.webp?t=1674576317" type="image/jpeg" length="67588"/>
    </item>
    <item>
      <title>New cybersecurity technology 2022</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine highlights innovative cybersecurity products, including threat intelligence, incident response, data protection, endpoint detection & response, IAM, & more.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98726</guid>
      <pubDate>Mon, 19 Dec 2022 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98726-new-cybersecurity-technology-2022</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/cyber-products-tech-fp1170x650.webp?t=1671553963" type="image/jpeg" length="336392"/>
    </item>
    <item>
      <title>Endpoint detection &amp; response and its cybersecurity benefits</title>
      <description>
        <![CDATA[<p>What are the four major cybersecurity capabilities endpoint detection and response (EDR) solutions provide? </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98680</guid>
      <pubDate>Mon, 05 Dec 2022 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98680-endpoint-detection-and-response-and-its-cybersecurity-benefits</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/endpoint-detection-and-response-fp1170.webp?t=1670250957" type="image/jpeg" length="498304"/>
    </item>
    <item>
      <title>With record-high data breaches, now is the time for cybersecurity storage adoption</title>
      <description>
        <![CDATA[<p>Organizations must take proactive steps to <span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">address the fundamental challenges of data protection, data storage and data compliance processes with cyberstorage solutions.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98545</guid>
      <pubDate>Fri, 28 Oct 2022 10:20:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98545-with-record-high-data-breaches-now-is-the-time-for-cybersecurity-storage-adoption</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/cybersecurity-strategy-fp1170x658v5.webp?t=1669821197" type="image/jpeg" length="159778"/>
    </item>
    <item>
      <title>Banking &amp; behavioral biometrics: Understanding privacy &amp; security regulations</title>
      <description>
        <![CDATA[<p>Banks and financial services providers need to understand what legislation and regulations are in place to cover the privacy and security aspects of behavioral biometric technology.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98506</guid>
      <pubDate>Fri, 21 Oct 2022 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98506-banking-and-behavioral-biometrics-understanding-privacy-and-security-regulations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/10/19/etienne-martin-2_K82gx9Uk8-unsplash.webp?t=1666376891" type="image/jpeg" length="284431"/>
    </item>
    <item>
      <title>Cybersecurity founded on 3 pillars: Technology, process, and people</title>
      <description>
        <![CDATA[<p><span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;"> C<span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">omprehensive cybersecurity measures, such as security technology, risk management and education & training, are needed to secure the enterprise from inside out. </span>
</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98489</guid>
      <pubDate>Mon, 17 Oct 2022 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98489-cybersecurity-founded-on-3-pillars-technology-process-and-people</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/cyber-security-freepik24.webp?t=1662130127" type="image/jpeg" length="218129"/>
    </item>
    <item>
      <title>Cybersecurity threat monitoring and risk assessment solutions</title>
      <description>
        <![CDATA[<p>Security magazine spotlights cybersecurity threat monitoring and risk assessment solutions that can help improve security posture at various organizations.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98056</guid>
      <pubDate>Fri, 22 Jul 2022 10:21:18 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98056-cybersecurity-threat-monitoring-and-risk-assessment-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/cyber-products-freepik.webp?t=1658763400" type="image/jpeg" length="385189"/>
    </item>
    <item>
      <title>RSA Conference 2022 product preview</title>
      <description>
        <![CDATA[<p>From security policy building to automated cybersecurity defense, <em>Security </em>magazine spotlights solutions from the 2022 RSA Conference.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97416</guid>
      <pubDate>Wed, 13 Apr 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97416-rsa-conference-2022-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/april/SEC-0422-Prods-Feat-Slide1-1170x658.webp?t=1649851509" type="image/jpeg" length="92384"/>
    </item>
    <item>
      <title>Product spotlight on healthcare solutions</title>
      <description>
        <![CDATA[<p>Security magazine spotlights solutions that can benefit security professionals in the healthcare sector, from securing medical devices to connecting first responders with live incident video streams.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96904</guid>
      <pubDate>Fri, 14 Jan 2022 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96904-product-spotlight-on-healthcare-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/Jan/SEC0122-ProdSpot-Feat-Slide1_1170x658.webp?t=1642118133" type="image/jpeg" length="92117"/>
    </item>
    <item>
      <title>Cybersecurity solutions roundup 2021</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine spotlights cybersecurity solutions released in 2021, covering everything from insider risk mitigation to improved threat monitoring.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96762</guid>
      <pubDate>Fri, 17 Dec 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96762-cybersecurity-solutions-roundup-2021</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/12/17/SEC1221-ProdSpot-WEBex_900px-(1).webp?t=1639772182" type="image/jpeg" length="263795"/>
    </item>
    <item>
      <title>Product spotlight on identity management solutions</title>
      <description>
        <![CDATA[<p>Securing physical or digital assets are at the heart of reducing enterprise and business risks. Identity management solutions help enterprises verify a user’s identity and ensure that only authorized users access facilities, applications, systems or networks. Let’s explore a sampling of the latest identity management solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96570</guid>
      <pubDate>Tue, 23 Nov 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96570-product-spotlight-on-identity-management-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/10/SEC1021-ProdSpot-Feat-slide1_900px.webp?t=1634245017" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>ISC West Product Preview 2021</title>
      <description>
        <![CDATA[<p>Here are some of the security solutions that will be displayed at this year&#39;s ISC West.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95417</guid>
      <pubDate>Wed, 16 Jun 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95417-isc-west-product-preview-2021</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/June/Product-Spotlight/SEC0621-ProdSpot-Feat-slide1_900px.webp?t=1623767242" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Product spotlight on cybersecurity, data protection, and privacy solutions</title>
      <description>
        <![CDATA[<p>Check out the latest cybersecurity products, all designed to protect your networks, infrastructure, critical data, assets and private information.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95033</guid>
      <pubDate>Fri, 16 Apr 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95033-product-spotlight-on-cybersecurity-data-protection-and-privacy-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/April/product-spotlight/SEC0421-ProdSpot-Feat-slide1_900px.webp?t=1618587848" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Product Spotlight On Privacy Protection Solutions</title>
      <description>
        <![CDATA[<p>Check out the latest privacy protection solutions designed to reduce digital risk, safeguard data and overall improve privacy.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94867</guid>
      <pubDate>Mon, 22 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94867-product-spotlight-on-privacy-protection-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-Feat-slide1_900px.webp?t=1616439744" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Third-party components putting operational hardware and software technologies at risk</title>
      <description>
        <![CDATA[<p>Claroty researchers have uncovered six critical vulnerabilities in third-party license management components, which could expose operational technology (OT) environments (hardware and software components)&nbsp;across numerous industries to exploits via cyberattacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/93312</guid>
      <pubDate>Wed, 09 Sep 2020 12:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/93312-third-party-components-putting-operational-hardware-and-software-technologies-at-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/code-1689066_19201.webp?t=1599664549" type="image/jpeg" length="275712"/>
    </item>
    <item>
      <title>FBI Warns About Smart TV's Potential to Spy on Users</title>
      <description>
        <![CDATA[The Federal Bureau of Investigation (FBI) has warned about smart TV's potential to spy and snoop on users. ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91384</guid>
      <pubDate>Thu, 05 Dec 2019 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/91384-fbi-warns-about-smart-tvs-potential-to-spy-on-users</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/smart-tv.webp?t=1575663098" type="image/jpeg" length="342131"/>
    </item>
    <item>
      <title>Facebook Discloses Vulnerability in WhatsApp Messaging Software</title>
      <description>
        <![CDATA[Facebook has disclosed the existence of a vulnerability leading to remote code execution attacks in WhatsApp messaging software.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91383</guid>
      <pubDate>Thu, 05 Dec 2019 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/91383-facebook-discloses-vulnerability-in-whatsapp-messaging-software</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC/2018/cyber_900.webp?t=1539117733" type="image/jpeg" length="141241"/>
    </item>
    <item>
      <title>New Zealand Government Encourages Cybersecurity Resilience, Governance</title>
      <description>
        <![CDATA[The Government Communications Security Bureau from New Zealand is encouraging public and private sector leaders to get more connected with their organizations’ cybersecurity governance.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91380</guid>
      <pubDate>Thu, 05 Dec 2019 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/91380-new-zealand-government-encourages-cybersecurity-resilience-governance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC/2017/April/SEC0417-rsa-feat-slide1_900px.webp?t=1555965693" type="image/jpeg" length="94383"/>
    </item>
    <item>
      <title>Cybersecurity Company Avast Breached by Hackers</title>
      <description>
        <![CDATA[Threat actors breached the network of cybersecurity company Avast in a sophisticated cyber operation, referred to as “Abiss,” that likely attempted to poison the supply chain and target its anti-virus software, CCleaner. ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91189</guid>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91189-cybersecurity-company-avast-breached-by-hackers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC/2017/March/SEC0317-edu-feat-slide1_900px.webp?t=1564758433" type="image/jpeg" length="95129"/>
    </item>
    <item>
      <title>Don't Shift Left, Start Left: Why Developers Should Be the First Line of Defense</title>
      <description>
        <![CDATA[<p>In a recent <em>Security</em> webinar, How You Can Turn Security Training and Awareness into Action, Pieter Danhieux, Co-Founder and CEO of Secure Code Warrior, says there are 111 billion lines of code written by an estimated 22 million developers every year. &ldquo;Building code is like building a house. If you do everything well, you end up with a beautiful, modern and secure house,&rdquo;&nbsp;says Danhieux.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91181</guid>
      <pubDate>Tue, 29 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91181-dont-shift-left-start-left--why-developers-should-be-the-first-line-of-defense-in-enterprises</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/secenews/2018/code-900.webp?t=1517501307" type="image/jpeg" length="124527"/>
    </item>
    <item>
      <title>Vimeo Accused of Violating Illinois Biometric Information Privacy Act</title>
      <description>
        <![CDATA[Vimeo, a video platform, has been accused of violating the Illinois Biometric Information Privacy Act (BIPA) for illegally storing, collecting and using individuals' biometric indentifiers and biometric information without written consent. ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91122</guid>
      <pubDate>Fri, 18 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91122-vimeo-accused-of-violating-illinois-biometric-information-privacy-act</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/eye-2771171_1280.webp?t=1559834232" type="image/jpeg" length="203562"/>
    </item>
    <item>
      <title>France's Digital ID Plan Breaches Europe's Privacy Regulations</title>
      <description>
        <![CDATA[The French government’s plan to launch facial recognition technology in November with the aim of giving citizens secure digital identities “seems premature,” Digital Minister Cedric O told Le Monde newspaper.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91121</guid>
      <pubDate>Fri, 18 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91121-frances-digital-id-plan-breaches-europes-privacy-regulations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Default-images/Responsive-Defaults/facial-recognition.webp?t=1597075813" type="image/jpeg" length="317495"/>
    </item>
    <item>
      <title>Penn State Students Create Method to Improve IoT Devices</title>
      <description>
        <![CDATA[<p>Penn State World Campus students have developed&nbsp;a&nbsp;multi-pronged data analysis approach that can improve&nbsp;Internet of Things (IoT) devices to protect against&nbsp;cybersecurity threats, according to a Penn State news report.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91092</guid>
      <pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91092-penn-state-students-create-method-of-improving-iot-devices</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/secenews/2017/iot-9001.webp?t=1504027108" type="image/jpeg" length="108567"/>
    </item>
    <item>
      <title>Email Service Click2Mail Suffers Data Breach</title>
      <description>
        <![CDATA[Email service Click2Mail has notified its customers of a recent data breach.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91091</guid>
      <pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91091-email-service-click2mail-suffers-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC/2016/0416/SEC0416-data-feature-slide1_900px.webp?t=1608652672" type="image/jpeg" length="238439"/>
    </item>
    <item>
      <title>Facebook, Instagram Introduce "Threads," Reportedly Designed With Privacy in Mind</title>
      <description>
        <![CDATA[Facebook has announced it will introduce a new feature to its Instagram application: "Threads."]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91049</guid>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91049-facebook-instagram-introduce-threads-designed-with-privacy-in-mind</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Default-images/Responsive-Defaults/socialmedia1-900px.webp?t=1472047046" type="image/jpeg" length="110119"/>
    </item>
    <item>
      <title>France to Become First European Country to Implement Facial Recognition ID App</title>
      <description>
        <![CDATA[President Emmanuel Macron has announced that France will implement a nationwide facial recognition ID application to give citizens a more secure digital identity. ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91048</guid>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91048-france-to-become-first-european-country-to-implement-facial-recognition-id-app</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/evolution-3778196_1280.webp?t=1562084828" type="image/jpeg" length="469089"/>
    </item>
    <item>
      <title>Mobile Carriers Introduce ZenKey: A New Way of Logging Into Apps</title>
      <description>
        <![CDATA[Last September, four mobile carriers (AT&T, Sprint, T-Mobile and Verizon) announced Project Verify, a way to log into apps without making a new account or password by instead relying on smartphones to authenticate identities.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91047</guid>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91047-mobile-carriers-introduce-zenkey-a-new-way-of-logging-into-apps</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/iphone-410324_1280.webp?t=1556664644" type="image/jpeg" length="179737"/>
    </item>
    <item>
      <title>Uber's App Update to Focus on Rideshare Safety</title>
      <description>
        <![CDATA[<p>At an event, Uber CEO Dara Khosrowshahi unveiled&nbsp;a new vision for the rideshare app, which will focus on improving the safety and experience of Uber users and drivers.&nbsp;</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91005</guid>
      <pubDate>Fri, 27 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91005-ubers-app-update-to-focus-on-rideshare-safety</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/rideshare.webp?t=1567958057" type="image/jpeg" length="355542"/>
    </item>
  </channel>
</rss>
