<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Top Stories</title>
    <description>
      <![CDATA[Stay updated on enterprise security trends, strategies, and best practices with in-depth coverage of cybersecurity, physical security, risk management, and leadership insights.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2761</link>
    <language>en-us</language>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1772553601" type="image/png" length="437035"/>
    </item>
    <item>
      <title>Security’s Top Cybersecurity Leaders 2026</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine’s Top Cybersecurity Leaders 2026 award program highlights the accomplishments of ten visionary information security leaders across sectors.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102134</guid>
      <pubDate>Tue, 03 Mar 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102134-securitys-top-cybersecurity-leaders-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F1-HERO-Slide-1440x750.webp?t=1771863784" type="image/jpeg" length="126884"/>
    </item>
    <item>
      <title>Why Security Teams Can No Longer Ignore Recruitment Fraud</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Recruitment sits at the intersection of brand, identity, and external engagement, yet it has historically lived outside formal security ownership.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102150</guid>
      <pubDate>Mon, 02 Mar 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102150-why-security-teams-can-no-longer-ignore-recruitment-fraud</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/27/Job-interview-by-Resume-Genius.webp?t=1772223512" type="image/png" length="418360"/>
    </item>
    <item>
      <title>Enhancing Incident Response with Integrated Access Control and Video Verification</title>
      <description>
        <![CDATA[<p>Evolving threats have security teams on alert to integrate solutions that both mitigate and combat different scenarios.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102145</guid>
      <pubDate>Fri, 27 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102145-enhancing-incident-response-with-integrated-access-control-and-video-verification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F3-Feat-Slide1-1170x658.webp?t=1772642385" type="image/jpeg" length="161473"/>
    </item>
    <item>
      <title>Harvest Now, Decrypt Later: Preparing for the Quantum Hangover</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Quantum computing will be the next major shockwave to hit cybersecurity.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102146</guid>
      <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102146-harvest-now-decrypt-later-preparing-for-the-quantum-hangover</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/25/Blurry-keyboard-by-Mohamed-Marey.webp?t=1772038004" type="image/png" length="373204"/>
    </item>
    <item>
      <title>From the Outside In: A Smarter Approach to Vendor Access</title>
      <description>
        <![CDATA[<p>Modern access control strategies are shifting focus to vendors, contractors, and the perimeter itself.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102141</guid>
      <pubDate>Wed, 25 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102141-from-the-outside-in-a-smarter-approach-to-vendor-access</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0226-F4-Feat-Slide1-1170x658.webp?t=1772642386" type="image/jpeg" length="72673"/>
    </item>
    <item>
      <title>AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare</title>
      <description>
        <![CDATA[<p>AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102143</guid>
      <pubDate>Tue, 24 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102143-ai-generated-image-based-harm-is-becoming-a-security-issue-organizations-must-prepare</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/23/AI-computer-chip-by-Immo-Wegmann.webp?t=1771854047" type="image/png" length="754546"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>Security Insights Delivered Through Podcasts</title>
      <description>
        <![CDATA[<p>Listen in as security leaders discuss professional and personal stories from their security careers in episodes of Lock It Down with <em>Security</em>.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102118</guid>
      <pubDate>Wed, 18 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102118-security-insights-delivered-through-podcasts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Talk-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="210972"/>
    </item>
    <item>
      <title>The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines</title>
      <description>
        <![CDATA[<p>Internal AI assistants are&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">a new class of exposure that most organizations are unprepared to manage.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102126</guid>
      <pubDate>Tue, 17 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102126-the-copilot-problem-why-internal-ai-assistants-are-becoming-accidental-data-breach-engines</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/16/Man-coding-by-KeepCoding.webp?t=1771464182" type="image/png" length="320974"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Critical Thinking Erosion: A Hidden Threat to Security Career Resilience</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>While cybersecurity is vital, it is only one piece of the larger security puzzle.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102117</guid>
      <pubDate>Mon, 16 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102117-critical-thinking-erosion-a-hidden-threat-to-security-career-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Career-Feat-Slide1-1170x658.webp?t=1772041699" type="image/jpeg" length="153150"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>Plenty of Associations, But Not Enough Association</title>
      <description>
        <![CDATA[<p>Thriving in the security industry could mean joining professional associations wisely.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102116</guid>
      <pubDate>Fri, 13 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102116-plenty-of-associations-but-not-enough-association</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-021.webp?t=1772041699" type="image/jpeg" length="83687"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>Understanding Breaches Before and After They Happen: What Every Organization Should Know</title>
      <description>
        <![CDATA[<p>Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102121</guid>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102121-understanding-breaches-before-and-after-they-happen-what-every-organization-should-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Two-open-padlocks-with-one-closed-by-FlyD.webp?t=1771464183" type="image/png" length="344327"/>
    </item>
    <item>
      <title>Product Spotlight on Analytics</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a few analytics products on the market in 2026.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102107</guid>
      <pubDate>Mon, 09 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102107-product-spotlight-on-analytics</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-ProdSpot-Feat_1170x658.webp?t=1770858203" type="image/jpeg" length="90105"/>
    </item>
    <item>
      <title>Five Top Tips for Building a Strong Security Culture</title>
      <description>
        <![CDATA[<p>Courtney Hans, Vice President of Cyber Services at ANV, shares her top five tips for building a security-first organization.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102106</guid>
      <pubDate>Fri, 06 Feb 2026 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102106-five-top-tips-for-building-a-strong-security-culture</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F2-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="141185"/>
    </item>
    <item>
      <title>Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching</title>
      <description>
        <![CDATA[<p>The Super Bowl is not just a game, but a blueprint for how modern risk must be managed.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102114</guid>
      <pubDate>Fri, 06 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102114-security-risks-around-super-bowl-lx-what-security-leaders-should-be-watching</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/05/NFL-footballs-by-Adrian-Curiel.webp?t=1770858201" type="image/png" length="480705"/>
    </item>
    <item>
      <title>Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure</title>
      <description>
        <![CDATA[<p>New analysis of healthcare cyber losses suggests that foundational controls remain the most effective at reducing risk.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102112</guid>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102112-healthcare-cybersecurity-is-in-crisis-these-proven-controls-could-be-the-cure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Medical-professional-using-tablet-by-Nappy.webp?t=1770217941" type="image/png" length="458228"/>
    </item>
    <item>
      <title>Privilege Disruption: The Key Choke Point for Cyber Deterrence</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The government and private sector alike must recognize the importance of privilege disruption.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102111</guid>
      <pubDate>Wed, 04 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102111-privilege-disruption-the-key-choke-point-for-cyber-deterrence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/03/Computer-and-laptop-by-Mamur-Saitbaev.webp?t=1770144049" type="image/png" length="235318"/>
    </item>
    <item>
      <title>How Banks Can Protect Their Most Valuable Asset: Customers</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security experts share how banks and financial institutions can defend their people, property and customers.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102104</guid>
      <pubDate>Tue, 03 Feb 2026 00:08:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102104-how-banks-can-protect-their-most-valuable-asset-customers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F1-Feat-Slide1-1170x658.webp?t=1770858202" type="image/jpeg" length="76899"/>
    </item>
    <item>
      <title>Leveraging ISACA for Your CMMC Career</title>
      <description>
        <![CDATA[<p>The Cybersecurity Maturity Model Certification sets the benchmark for how DoW contractors prove cybersecurity readiness.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102105</guid>
      <pubDate>Tue, 03 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102105-leveraging-isaca-for-your-cmmc-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Cyber-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="229204"/>
    </item>
    <item>
      <title>Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging</title>
      <description>
        <![CDATA[<p>With pure exfiltration, businesses don’t realize they’re a victim until it’s too late.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102103</guid>
      <pubDate>Mon, 02 Feb 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102103-ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/30/Abstract-rendered-coding-blocks-by-Steve-Johnson.webp?t=1769788357" type="image/png" length="481443"/>
    </item>
    <item>
      <title>Securing Trust: Why Crisis Communication is Your First Line of Defense</title>
      <description>
        <![CDATA[<p>Trust is lost in minutes during a crisis, and clear, human communication is the only way to win it back.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102099</guid>
      <pubDate>Fri, 30 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102099-securing-trust-why-crisis-communication-is-your-first-line-of-defense</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Cyber-Feat-Slide1-1170x658.webp?t=1769609318" type="image/jpeg" length="49788"/>
    </item>
    <item>
      <title>The New Battleground of Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with James Maude, Field CTO at BeyondTrust, about what believes is the new battleground of cybersecurity.&nbsp;&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102100</guid>
      <pubDate>Thu, 29 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102100-the-new-battleground-of-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/SEC_Web_5Minutes-Maude-0226_1170x658.webp?t=1769617497" type="image/jpeg" length="98695"/>
    </item>
    <item>
      <title>Strong Privacy Requires Strong Security — and GenAI Raises the Stakes</title>
      <description>
        <![CDATA[<p>Privacy and security are not competing disciplines; they are inseparable components of the same responsibility.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102098</guid>
      <pubDate>Wed, 28 Jan 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102098-strong-privacy-requires-strong-security-and-genai-raises-the-stakes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/27/Keys-on-yellow-background-by-Alp-Duran.webp?t=1769531813" type="image/png" length="411957"/>
    </item>
    <item>
      <title>CISO Salaries Continue to Rise Despite Economic Uncertainty</title>
      <description>
        <![CDATA[<p>CISO salaries rise despite economic concerns.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102092</guid>
      <pubDate>Wed, 28 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102092-ciso-salaries-continue-to-rise-despite-economic-uncertainty</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-News2-Feat-Slide1-1170x658.webp?t=1769093369" type="image/jpeg" length="131197"/>
    </item>
  </channel>
</rss>
