<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Services</title>
    <description>
      <![CDATA[Guarding and security officers, executive protection, loss prevention, event security and more — learn about these and other security services that can help build a successful enterprise security program.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2669</link>
    <language>en-us</language>
    <item>
      <title>RSA 2025 product preview</title>
      <description>
        <![CDATA[<p>RSA 2025 takes place from April 28 through May 1 in San Francisco, California, bringing together cybersecurity leaders from all over the country. Security magazine highlights a few products from this year’s RSA exhibitors.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101521</guid>
      <pubDate>Tue, 08 Apr 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101521-rsa-2025-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/04-April/SEC-0425-ProdSpot-Slide_1170x658.webp?t=1744035739" type="image/jpeg" length="92307"/>
    </item>
    <item>
      <title>2025 ISC West product preview</title>
      <description>
        <![CDATA[<p>Security magazine highlights a variety of products on display at this year’s conference.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101455</guid>
      <pubDate>Tue, 11 Mar 2025 23:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101455-2025-isc-west-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/03-March/SEC-0325-ProdSpot-Feat_1170x658.webp?t=1741696130" type="image/jpeg" length="92531"/>
    </item>
    <item>
      <title>Product spotlight on mobile solutions</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights both cyber and physical mobile security solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101334</guid>
      <pubDate>Fri, 07 Feb 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101334-product-spotlight-on-mobile-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/02-February/SEC-0225-ProdSpot-Feat_1170x658.webp?t=1738003905" type="image/jpeg" length="91960"/>
    </item>
    <item>
      <title>Product spotlight on video surveillance</title>
      <description>
        <![CDATA[<p>Security magazine highlights a number of video surveillance solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101278</guid>
      <pubDate>Fri, 10 Jan 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101278-product-spotlight-on-video-surveillance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/01-January/SEC-0125-ProdSpot-Feat1_1170x658.webp?t=1736265758" type="image/jpeg" length="92616"/>
    </item>
    <item>
      <title>Product spotlight: Year in review</title>
      <description>
        <![CDATA[<p>Security magazine highlights some of the products that have been released in 2024.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101227</guid>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101227-product-spotlight-year-in-review</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/12-December/SEC-1224-ProdSpot-Feat_1170x658.webp?t=1733412804" type="image/jpeg" length="88752"/>
    </item>
    <item>
      <title>Product spotlight on analytics</title>
      <description>
        <![CDATA[<p>Security magazine showcases analytics platforms focused on monitoring and organizing data from a variety of sources.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101175</guid>
      <pubDate>Tue, 12 Nov 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101175-product-spotlight-on-analytics</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/11-November/SEC-1124-ProdSpot-Feat-Slide_1170x658.webp?t=1730826883" type="image/jpeg" length="87189"/>
    </item>
    <item>
      <title>Product spotlight on robotics and drones</title>
      <description>
        <![CDATA[<p>Security leaders can utilize robotics and drones to increase visibility without risking additional personnel.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101101</guid>
      <pubDate>Tue, 08 Oct 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101101-product-spotlight-on-robotics-and-drones</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/10-October/SEC-1024-ProdSpot-FEAT_1170x658.webp?t=1728060462" type="image/jpeg" length="92348"/>
    </item>
    <item>
      <title>Product spotlight: GSX 2024 product preview</title>
      <description>
        <![CDATA[<p>Security magazine highlights some of the products featured at GSX 2024.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101007</guid>
      <pubDate>Tue, 10 Sep 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101007-product-spotlight-gsx-2024-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/09-September/SEC-0924-ProdSpot-Feat_1170x658.webp?t=1725470763" type="image/jpeg" length="92745"/>
    </item>
    <item>
      <title>Product spotlight on cybersecurity</title>
      <description>
        <![CDATA[<p>Security magazine highlights a variety of cybersecurity products to protect data and businesses.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100903</guid>
      <pubDate>Tue, 06 Aug 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100903-product-spotlight-on-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/08-August/SEC-0824-ProdSpot-Feat-Slide1_1170x658.webp?t=1722452754" type="image/jpeg" length="91169"/>
    </item>
    <item>
      <title>Product spotlight on access control</title>
      <description>
        <![CDATA[<p>Security magazine highlights physical and cyber access control solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100837</guid>
      <pubDate>Tue, 09 Jul 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100837-product-spotlight-on-access-control</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/07-July/SEC-0724-Prod-Feat-Slide1_1170x658.webp?t=1720463512" type="image/jpeg" length="91835"/>
    </item>
    <item>
      <title>Product spotlight on risk and threat monitoring</title>
      <description>
        <![CDATA[<p>Security magazine highlights a few products that help keep critical systems safe from attack.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100767</guid>
      <pubDate>Tue, 11 Jun 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100767-product-spotlight-on-risk-and-threat-monitoring</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/06-June/SEC-0624-ProdSpot-Feat-Slide1_1170x658.webp?t=1717774821" type="image/jpeg" length="92556"/>
    </item>
    <item>
      <title>RSA Conference</title>
      <description>
        <![CDATA[<p>Security magazine highlights products being showcased at this year's RSA Conference.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100636</guid>
      <pubDate>Tue, 07 May 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100636-rsa-conference</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/05-May/SEC-0524-ProdSpot-Feat_1170x658.webp?t=1715008498" type="image/jpeg" length="89375"/>
    </item>
    <item>
      <title>ISC West product preview</title>
      <description>
        <![CDATA[<p>This month, Security magazine highlights some of the products that will be featured at ISC West.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100566</guid>
      <pubDate>Tue, 09 Apr 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100566-isc-west-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/04-April/SEC-0424-ProdSpot-Feat_1170x658.webp?t=1712074698" type="image/jpeg" length="92737"/>
    </item>
    <item>
      <title>Five reasons a building needs a peer-to-peer based IP intercom system</title>
      <description>
        <![CDATA[<p>Intercom systems can provide a facility with a significant amount of security and control, enabling users to communicate with other individuals.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100434</guid>
      <pubDate>Fri, 23 Feb 2024 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100434-five-reasons-a-building-needs-a-peer-to-peer-based-ip-intercom-system</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/02/22/artemis-faul-XAyEhxxmt9A-unsplash.webp?t=1708766145" type="image/jpeg" length="189791"/>
    </item>
    <item>
      <title>The security implications of using ChatGPT in the workplace</title>
      <description>
        <![CDATA[<p>The increasing prevalence of AI technologies such as ChatGPT have raised concerns among security leaders, especially if used within the workplace.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99174</guid>
      <pubDate>Fri, 07 Apr 2023 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99174-the-security-implications-of-using-chatgpt-in-the-workplace</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/04/07/philipp-katzenberger-iIJrUoeRoCQ-unsplash-(1).webp?t=1701896522" type="image/jpeg" length="54077"/>
    </item>
    <item>
      <title>National Emergency Communications Month Initiatives Highlight Cyber &amp; Physical Safety</title>
      <description>
        <![CDATA[<p>April is Emergency Communications Month, honoring the nation’s emergency communicators, so what better time to take stock of your company’s emergency preparedness both cyber and physical?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99172</guid>
      <pubDate>Fri, 07 Apr 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99172-national-emergency-communications-month-initiatives-highlight-cyber-and-physical-safety</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Sponsored-Content/Brivo/GettyImages-154971102.webp?t=1680882804" type="image/jpeg" length="167572"/>
    </item>
    <item>
      <title>The importance of VPNs for hybrid workforces</title>
      <description>
        <![CDATA[<p>VPNs offer the necessary protection to keep data safe, particularly when it comes to using a VPN for business purposes within hybrid workforces.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99150</guid>
      <pubDate>Tue, 04 Apr 2023 13:55:21 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99150-the-importance-of-vpns-for-hybrid-workforces</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/04/04/privecstasy-CXlqHmQy3MY-unsplash.webp?t=1680630666" type="image/jpeg" length="76636"/>
    </item>
    <item>
      <title>Comply with the new data privacy regulations now</title>
      <author></author>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Organizational cybersecurity leaders must prepare for impending data privacy legislation to remain compliant and prioritize user data protection.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98887</guid>
      <pubDate>Mon, 13 Mar 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98887-comply-with-the-new-data-privacy-regulations-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/02/03/data-privacy.webp?t=1675450335" type="image/jpeg" length="112641"/>
    </item>
    <item>
      <title>Reducing RPA security risk</title>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Robot process automation (RPA) has expanded to meet workforce needs. Unfortunately, RPA can put the sensitive data that it touches at risk. </span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98953</guid>
      <pubDate>Tue, 14 Feb 2023 11:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98953-reducing-rpa-security-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/02/14/adi-goldstein-EUsVwEOsblE-unsplash.webp?t=1676387674" type="image/jpeg" length="181764"/>
    </item>
    <item>
      <title>AI-based security solutions can detect &amp; prevent fraudulent activity</title>
      <description>
        <![CDATA[<p>Sophisticated fraud both is on the rise and wildly successful. AI-based security solutions can help prevent fraud by flagging suspicious activity.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98863</guid>
      <pubDate>Fri, 03 Feb 2023 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98863-ai-based-security-solutions-can-detect-and-prevent-fraudulent-activity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/02/01/jefferson-santos-9SoCnyQmkzI-unsplash.webp?t=1675438279" type="image/jpeg" length="41189"/>
    </item>
    <item>
      <title>NIST creates new risk management framework to build trust in AI</title>
      <author></author>
      <description>
        <![CDATA[<p>The National Institute of Standards and Technology released an AI risk management framework to help companies safely navigate the use of AI.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98848</guid>
      <pubDate>Fri, 27 Jan 2023 14:53:15 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98848-nist-creates-new-risk-management-framework-to-build-trust-in-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/27/artificial-intelligence-g2bba817d3_1280.webp?t=1674846569" type="image/jpeg" length="257714"/>
    </item>
    <item>
      <title>Grubhub integrates safety platform to boost driver security</title>
      <author></author>
      <description>
        <![CDATA[<p>An intelligent safety platform integrates with Grubhub for Drivers app, routing accurate location and identification data to 911 responders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98832</guid>
      <pubDate>Wed, 25 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98832-grubhub-integrates-safety-platform-to-boost-driver-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/25/thai-an-FDCuK-B_f3A-unsplash.webp?t=1674658257" type="image/jpeg" length="75417"/>
    </item>
    <item>
      <title>Water storage is under cyber threat</title>
      <description>
        <![CDATA[<p>Protecting critical infrastructure from cyberattacks continues to grow in importance, and the next sector of interest is water supply and storage.  </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98816</guid>
      <pubDate>Tue, 24 Jan 2023 08:04:48 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98816-water-storage-is-under-cyber-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/23/ana-filipa-neves-e0ah37y807k-unsplash.webp?t=1674490570" type="image/jpeg" length="108180"/>
    </item>
    <item>
      <title>What data loss prevention can do to protect your most valuable asset</title>
      <description>
        <![CDATA[<p>Data loss prevention (DLP) is among the new generation of defenses against cyberattacks, especially when part of a multi-layered security strategy. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98800</guid>
      <pubDate>Fri, 20 Jan 2023 10:21:11 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98800-what-data-loss-prevention-can-do-to-protect-your-most-valuable-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/18/philipp-katzenberger-iIJrUoeRoCQ-unsplash.webp?t=1674072582" type="image/jpeg" length="51472"/>
    </item>
    <item>
      <title>2022 SMB ransomware report reveals increased cybersecurity investments</title>
      <author></author>
      <description>
        <![CDATA[<p>A 2022 Ransomware report released by Datto shows that SMBs are aware of increasing cyber threats and are investing in network and cloud security.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98796</guid>
      <pubDate>Wed, 18 Jan 2023 13:31:42 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98796-2022-smb-ransomware-report-reveals-increased-cybersecurity-investments</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/17/cyber-gc98837a93_1280.webp?t=1674049377" type="image/jpeg" length="191100"/>
    </item>
    <item>
      <title>Maryland launches state Information Sharing and Analysis Center</title>
      <author></author>
      <description>
        <![CDATA[<p>Maryland has launched a statewide Information Sharing and Analysis Center, which aims to connect government & enterprise security programs.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98790</guid>
      <pubDate>Tue, 17 Jan 2023 11:36:37 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98790-maryland-launches-state-information-sharing-and-analysis-center</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/17/thisisengineering-raeng-w_zE6qlkQKA-unsplash.webp?t=1673961866" type="image/jpeg" length="128792"/>
    </item>
    <item>
      <title>LastPass breach affects Virginia Tech security posture</title>
      <author></author>
      <description>
        <![CDATA[<p>Virginia Tech IT security leaders advised LastPass users to change their passwords to protect against data breaches and paused their LastPass rollout.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98785</guid>
      <pubDate>Mon, 16 Jan 2023 11:35:33 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98785-lastpass-breach-affects-virginia-tech-security-posture</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/16/internet-g9343eac9b_1280.webp?t=1673879270" type="image/jpeg" length="157325"/>
    </item>
    <item>
      <title>Bridgestone Arena enhances NHL fan safety via screening system</title>
      <author></author>
      <description>
        <![CDATA[<p>Bridgestone Arena, a Nashville event center and hockey stadium, has added a weapons detection system to bolster facility access control.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98787</guid>
      <pubDate>Mon, 16 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98787-bridgestone-arena-enhances-nhl-fan-safety-via-screening-system</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/16/hd-wallpaper-ga61bc0786_1920.webp?t=1673880532" type="image/jpeg" length="98782"/>
    </item>
    <item>
      <title>Product spotlight on access management </title>
      <description>
        <![CDATA[<p>Security magazine highlights the latest access management security technology. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98782</guid>
      <pubDate>Fri, 13 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98782-product-spotlight-on-access-management</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/jan/SEC-0123-ProdSpot-Feat-Slide1_1170x658.webp?t=1674835663" type="image/jpeg" length="91265"/>
    </item>
    <item>
      <title>Product spotlight on new security technology</title>
      <description>
        <![CDATA[<p>As the year ends, <em>Security </em>magazine highlights physical security products that were introduced to the market in 2022. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98701</guid>
      <pubDate>Mon, 12 Dec 2022 08:43:52 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98701-product-spotlight-on-new-security-technology</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/dec/SEC-1222-Prods-Feat-Slide1-1170x658.webp?t=1671478766" type="image/jpeg" length="92725"/>
    </item>
  </channel>
</rss>
