<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Top Stories</title>
    <description>
      <![CDATA[Stay updated on enterprise security trends, strategies, and best practices with in-depth coverage of cybersecurity, physical security, risk management, and leadership insights.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2761</link>
    <language>en-us</language>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1775142497" type="image/png" length="470607"/>
    </item>
    <item>
      <title>Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Training programs provide essential baseline knowledge, b<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ut training alone does not make someone proficient.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102200</guid>
      <pubDate>Thu, 02 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102200-beyond-the-certificate-why-real-expertise-in-investigative-interviewing-comes-from-practice</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/01/Interview-by-Vitaly-Gariev.webp?t=1775057353" type="image/png" length="347211"/>
    </item>
    <item>
      <title>The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats</title>
      <description>
        <![CDATA[<p>The corporate world has witnessed a dramatic shift in how companies safeguard their top leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102199</guid>
      <pubDate>Wed, 01 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102199-the-rising-tide-of-executive-protection-corporations-ramp-up-security-in-an-era-of-heightened-threats</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/31/Man-walking-with-briefcase-by-Marten-Bjork.webp?t=1774983008" type="image/png" length="369171"/>
    </item>
    <item>
      <title>Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Tax season-related phishing attacks have gotten more sophisticated as threat actors increasingly leverage generative AI.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102192</guid>
      <pubDate>Tue, 31 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102192-tax-season-means-phishing-season-how-individuals-and-businesses-can-protect-themselves</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Calculator-with-pen-and-notebook-by-Recha-Oktaviani.webp?t=1774281830" type="image/png" length="344356"/>
    </item>
    <item>
      <title>Beyond Locking Doors</title>
      <description>
        <![CDATA[<p>How access control data can support operational improvements.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102197</guid>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102197-beyond-locking-doors</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F3-Feat-Slide1-1170x658.webp?t=1774442739" type="image/jpeg" length="75767"/>
    </item>
    <item>
      <title>Recognizing Leadership and Industry Insight</title>
      <description>
        <![CDATA[<p>Input from readers strengthens Security Magazine annual initiatives.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102194</guid>
      <pubDate>Fri, 27 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102194-recognizing-leadership-and-industry-insight</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Talk-Feat-Slide1-1170x658.webp?t=1774282080" type="image/jpeg" length="59625"/>
    </item>
    <item>
      <title>Breaking Down “The Mosaic Effect”</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Luke Norris, C<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">o-Founder and CEO of Kamiwaza, about <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“the mosaic effect” and how AI is shaping it today.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102186</guid>
      <pubDate>Thu, 26 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102186-breaking-down-the-mosaic-effect</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/SEC_Web_5Minutes-Norris-0326_1170x658.webp?t=1773855022" type="image/jpeg" length="84529"/>
    </item>
    <item>
      <title>Succeeding A Legendary Leader</title>
      <description>
        <![CDATA[<p>What happens when stepping into the shadow of a seemingly irreplaceable predecessor.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102193</guid>
      <pubDate>Wed, 25 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102193-succeeding-a-legendary-leader</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Leader-Feat-Slide1-1170x658.webp?t=1774281191" type="image/jpeg" length="184258"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773759029" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Is Crowdsourcing Your Security Plan a Career Risk? </title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Build meaningful insights from relationships with other security leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102176</guid>
      <pubDate>Mon, 23 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102176-is-crowdsourcing-your-security-plan-a-career-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Career-Feat-Slide1-1170x658.webp?t=1773667811" type="image/jpeg" length="101737"/>
    </item>
    <item>
      <title>Taming the Threat Beast: Building a Threat-Led Cybersecurity Program</title>
      <description>
        <![CDATA[<p>Moving from noisy threat feeds to focused intelligence that security teams can actually act on.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102175</guid>
      <pubDate>Fri, 20 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102175-taming-the-threat-beast-building-a-threat-led-cybersecurity-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Cyber-Feat-Slide1-1170x658.webp?t=1773667443" type="image/jpeg" length="198421"/>
    </item>
    <item>
      <title>Mexico Security Crisis: Never Waste a Crisis</title>
      <description>
        <![CDATA[<p>The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102185</guid>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102185-mexico-security-crisis-never-waste-a-crisis</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Four-people-in-suits-by-Vitaly-Gariev.webp?t=1773848065" type="image/png" length="428539"/>
    </item>
    <item>
      <title>Threat Actors Target the Entire Retail Supply Chain</title>
      <description>
        <![CDATA[<p>The full supply chain is at risk for cyberattacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102174</guid>
      <pubDate>Wed, 18 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102174-threat-actors-target-the-entire-retail-supply-chain</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-News2-Feat-Slide1-1170x658.webp?t=1773666213" type="image/jpeg" length="120974"/>
    </item>
    <item>
      <title>Fear of Surveillance Leads to Increased VPN Use</title>
      <description>
        <![CDATA[<p>Americans are using VPNs for additional privacy.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102173</guid>
      <pubDate>Wed, 18 Mar 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102173-fear-of-surveillance-leads-to-increased-vpn-use</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-News1-Feat-Slide1-1170x658.webp?t=1773665614" type="image/jpeg" length="125574"/>
    </item>
    <item>
      <title>Document Protection: Why Hybrid Storage Is the Future of Security </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Strategically choose which data lives on a server and which lives physically.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102177</guid>
      <pubDate>Tue, 17 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102177-document-protection-why-hybrid-storage-is-the-future-of-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Open-filing-cabinet-by-Maksym-Kaharlytskyi.webp?t=1773670622" type="image/png" length="473786"/>
    </item>
    <item>
      <title>ISC West 2026 Product Preview</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a number of products that will be featured at ISC West 2026.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102165</guid>
      <pubDate>Mon, 16 Mar 2026 08:00:02 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102165-isc-west-2026-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Prods_Spot_Graphic_Header_2026_1440x750.webp?t=1773667764" type="image/jpeg" length="129750"/>
    </item>
    <item>
      <title>Discussing Use of Force in Security: A Challenging Discussion?</title>
      <description>
        <![CDATA[<p>Some may consider the use of force in security to be a challenging discussion, but it must be had in order to improve functionally and ethically.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102161</guid>
      <pubDate>Fri, 13 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102161-discussing-use-of-force-in-security-a-challenging-discussion</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Edu-Feat-Slide1-1170x658.webp?t=1772810452" type="image/jpeg" length="94254"/>
    </item>
    <item>
      <title>Cracking Cyber’s Talent Gap Challenge</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Solving the cybersecurity workforce challenge requires a shift in perspective.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102169</guid>
      <pubDate>Thu, 12 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102169-cracking-cybers-talent-gap-challenge</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/11/We-are-hiring-sign-by-Eric-Prouzet.webp?t=1773243878" type="image/png" length="597497"/>
    </item>
    <item>
      <title>Why Security Culture Metrics Matter More Than Dashboards</title>
      <description>
        <![CDATA[<p>Traditional metrics can be valuable, but they don’t tell the whole story. To truly understand the bigger picture of an organization’s security posture, leaders need to consider “culture metrics.”</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102160</guid>
      <pubDate>Wed, 11 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102160-why-security-culture-metrics-matter-more-than-dashboards</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F4-Feat-Slide1-1170x658.webp?t=1772809236" type="image/jpeg" length="92600"/>
    </item>
    <item>
      <title>Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The most advanced security technology in the world cannot recover an asset that was inadequately protected at the most critical moment.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102163</guid>
      <pubDate>Tue, 10 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102163-object-specific-protection-the-non-negotiable-foundation-of-art-and-asset-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Art-museum-by-Andrew-Faires.webp?t=1773063449" type="image/png" length="270613"/>
    </item>
    <item>
      <title>AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World</title>
      <description>
        <![CDATA[<p>Forensic accounting has always focused on identifying anomalies, reconstructing events, and assessing intent.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102158</guid>
      <pubDate>Mon, 09 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102158-ai-security-and-forensic-accounting-protecting-financial-systems-in-an-automated-world</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F2-Feat-Slide1-1170x658.webp?t=1772642521" type="image/jpeg" length="79902"/>
    </item>
    <item>
      <title>World Cup Safety and Security Is About More than Just Crime</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The 2026 World Cup tests every framework of public safety.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102159</guid>
      <pubDate>Fri, 06 Mar 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102159-world-cup-safety-and-security-is-about-more-than-just-crime</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/05/World-Cup-trophy-beside-goal-by-My-Profit-Tutor.webp?t=1772727405" type="image/png" length="505749"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1773279399" type="image/png" length="437035"/>
    </item>
    <item>
      <title>Security’s Top Cybersecurity Leaders 2026</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine’s Top Cybersecurity Leaders 2026 award program highlights the accomplishments of ten visionary information security leaders across sectors.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102134</guid>
      <pubDate>Tue, 03 Mar 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102134-securitys-top-cybersecurity-leaders-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F1-HERO-Slide-1440x750.webp?t=1771863784" type="image/jpeg" length="126884"/>
    </item>
    <item>
      <title>Why Security Teams Can No Longer Ignore Recruitment Fraud</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Recruitment sits at the intersection of brand, identity, and external engagement, yet it has historically lived outside formal security ownership.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102150</guid>
      <pubDate>Mon, 02 Mar 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102150-why-security-teams-can-no-longer-ignore-recruitment-fraud</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/27/Job-interview-by-Resume-Genius.webp?t=1773279399" type="image/png" length="418360"/>
    </item>
    <item>
      <title>Enhancing Incident Response with Integrated Access Control and Video Verification</title>
      <description>
        <![CDATA[<p>Evolving threats have security teams on alert to integrate solutions that both mitigate and combat different scenarios.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102145</guid>
      <pubDate>Fri, 27 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102145-enhancing-incident-response-with-integrated-access-control-and-video-verification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F3-Feat-Slide1-1170x658.webp?t=1772642385" type="image/jpeg" length="161473"/>
    </item>
    <item>
      <title>Harvest Now, Decrypt Later: Preparing for the Quantum Hangover</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Quantum computing will be the next major shockwave to hit cybersecurity.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102146</guid>
      <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102146-harvest-now-decrypt-later-preparing-for-the-quantum-hangover</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/25/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773279398" type="image/png" length="373204"/>
    </item>
    <item>
      <title>From the Outside In: A Smarter Approach to Vendor Access</title>
      <description>
        <![CDATA[<p>Modern access control strategies are shifting focus to vendors, contractors, and the perimeter itself.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102141</guid>
      <pubDate>Wed, 25 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102141-from-the-outside-in-a-smarter-approach-to-vendor-access</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0226-F4-Feat-Slide1-1170x658.webp?t=1772642386" type="image/jpeg" length="72673"/>
    </item>
    <item>
      <title>AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare</title>
      <description>
        <![CDATA[<p>AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102143</guid>
      <pubDate>Tue, 24 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102143-ai-generated-image-based-harm-is-becoming-a-security-issue-organizations-must-prepare</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/23/AI-computer-chip-by-Immo-Wegmann.webp?t=1773279401" type="image/png" length="754546"/>
    </item>
  </channel>
</rss>
