<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Management</title>
    <description>
      <![CDATA[Solutions for security enterprise leadership and management to enable the business.  ]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2786</link>
    <language>en-us</language>
    <item>
      <title>How CSOs Can Win Board Support for Gunshot Detection Technology</title>
      <description>
        <![CDATA[<p>How CSOs can win board support for gunshot detection technology.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102211</guid>
      <pubDate>Fri, 17 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102211-how-csos-can-win-board-support-for-gunshot-detection-technology</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F3-Feat-Slide1-1170x658.webp?t=1775571338" type="image/jpeg" length="69139"/>
    </item>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1776276357" type="image/png" length="470607"/>
    </item>
    <item>
      <title>How to Grow Your Cybersecurity Skills, According to Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How are cybersecurity professionals developing their career for the modern era?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102181</guid>
      <pubDate>Fri, 27 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102181-how-to-grow-your-cybersecurity-skills-according-to-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Young-man-working-on-laptop-in-coffee-shop-by-Miguel-Dominguez.webp?t=1774285182" type="image/png" length="621832"/>
    </item>
    <item>
      <title>What Does It Take to Be an Outstanding CSO or CISO?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, discusses what it takes to be a great CSO or CISO in the modern age.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102171</guid>
      <pubDate>Wed, 25 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102171-what-does-it-take-to-be-an-outstanding-cso-or-ciso</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/McHugh-podcast-news-header.webp?t=1773332170" type="image/png" length="132615"/>
    </item>
    <item>
      <title>Mexico Security Crisis: Never Waste a Crisis</title>
      <description>
        <![CDATA[<p>The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102185</guid>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102185-mexico-security-crisis-never-waste-a-crisis</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Four-people-in-suits-by-Vitaly-Gariev.webp?t=1773848065" type="image/png" length="428539"/>
    </item>
    <item>
      <title>Strategies for Security Leaders in the Midst of Skill Shortages</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em> Magazine, Chief Security & Trust Officer Kory Daniels shares how security leaders struggling with skill shortages can make strategic tradeoffs to lessen their team’s burden.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102142</guid>
      <pubDate>Wed, 25 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102142-strategies-for-security-leaders-in-the-midst-of-skill-shortages</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/20/Daniels-podcast-news-header.webp?t=1772642386" type="image/png" length="131691"/>
    </item>
    <item>
      <title>41% of Organizations Have Hired a Fake Candidate</title>
      <description>
        <![CDATA[<p>Deepfakes are leading to fraudulent job positions and hirings.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102140</guid>
      <pubDate>Mon, 23 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102140-41-of-organizations-have-hired-a-fake-candidate</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Global-News2-Slide2-1170x658.webp?t=1771603411" type="image/jpeg" length="139548"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>Security Insights Delivered Through Podcasts</title>
      <description>
        <![CDATA[<p>Listen in as security leaders discuss professional and personal stories from their security careers in episodes of Lock It Down with <em>Security</em>.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102118</guid>
      <pubDate>Wed, 18 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102118-security-insights-delivered-through-podcasts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Talk-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="210972"/>
    </item>
    <item>
      <title>Critical Thinking Erosion: A Hidden Threat to Security Career Resilience</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>While cybersecurity is vital, it is only one piece of the larger security puzzle.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102117</guid>
      <pubDate>Mon, 16 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102117-critical-thinking-erosion-a-hidden-threat-to-security-career-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Career-Feat-Slide1-1170x658.webp?t=1772041699" type="image/jpeg" length="153150"/>
    </item>
    <item>
      <title>Plenty of Associations, But Not Enough Association</title>
      <description>
        <![CDATA[<p>Thriving in the security industry could mean joining professional associations wisely.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102116</guid>
      <pubDate>Fri, 13 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102116-plenty-of-associations-but-not-enough-association</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-021.webp?t=1772041699" type="image/jpeg" length="83687"/>
    </item>
    <item>
      <title>Five Top Tips for Building a Strong Security Culture</title>
      <description>
        <![CDATA[<p>Courtney Hans, Vice President of Cyber Services at ANV, shares her top five tips for building a security-first organization.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102106</guid>
      <pubDate>Fri, 06 Feb 2026 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102106-five-top-tips-for-building-a-strong-security-culture</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F2-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="141185"/>
    </item>
    <item>
      <title>2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102101</guid>
      <pubDate>Wed, 28 Jan 2026 13:46:49 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102101-2026-enterprise-security-trends-what-leaders-must-prepare-for-in-an-interconnected-risk-landscape</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/nastuh-abootalebi-yWwob8kwOCk-unsplash-(1).webp?t=1769625646" type="image/jpeg" length="118868"/>
    </item>
    <item>
      <title>Why Your Security Team Needs to Hire Non-Traditional Professionals</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Aaron Walton, Threat Analyst at Expel, discusses&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">the value non-traditional professionals in cybersecurity.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102088</guid>
      <pubDate>Wed, 28 Jan 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102088-why-your-security-team-needs-to-hire-non-traditional-professionals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/20/Walton-podcast-news-header.webp?t=1768929115" type="image/png" length="124684"/>
    </item>
    <item>
      <title>The Inaugural Ed Chandler Security Innovation Award Presented to ADRM</title>
      <description>
        <![CDATA[<p>ADRM wins the first-ever Ed Chandler Security Innovation award at CONSULT 2025.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102085</guid>
      <pubDate>Fri, 23 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102085-the-inaugural-ed-chandler-security-innovation-award-presented-to-adrm</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F3-Feat-Slide1-1170x658.webp?t=1769626263" type="image/jpeg" length="71159"/>
    </item>
    <item>
      <title>What Background Checks Miss: The Human Layer Behind Modern Screening</title>
      <description>
        <![CDATA[<p>As background checks become more standard, they can run the risk of becoming less thorough.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102083</guid>
      <pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102083-what-background-checks-miss-the-human-layer-behind-modern-screening</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Edu-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="66133"/>
    </item>
    <item>
      <title>The Email Insider Threat Has Evolved in the Era of Generative AI</title>
      <description>
        <![CDATA[<p>Seemingly harmless tools such as AI grammar checkers pose a number of intellectual property risks</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102082</guid>
      <pubDate>Wed, 21 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102082-the-email-insider-threat-has-evolved-in-the-era-of-generative-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F4-Feat-Slide1-1170x658.webp?t=1769626265" type="image/jpeg" length="55439"/>
    </item>
    <item>
      <title>Private Sector Intelligence Careers</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>As corporate intelligence roles grow, gaps in analytic tradecraft education highlight the need for structured thinking and decision-support training.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102073</guid>
      <pubDate>Mon, 19 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102073-private-sector-intelligence-careers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Career-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="110926"/>
    </item>
    <item>
      <title>Escape Rooms, Mud Runs, and Game Nights: Cradles of Leadership?</title>
      <description>
        <![CDATA[<p>What team-building games can teach us about real leadership.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102072</guid>
      <pubDate>Fri, 16 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102072-escape-rooms-mud-runs-and-game-nights-cradles-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Leadership-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="121518"/>
    </item>
    <item>
      <title>Security’s New Year’s Resolution: Building Up the Next Generation</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How to build and retain the next generation of security leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102070</guid>
      <pubDate>Thu, 15 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102070-securitys-new-years-resolution-building-up-the-next-generation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F2-Feat-Slide1-1170x658.webp?t=1769626263" type="image/jpeg" length="61229"/>
    </item>
    <item>
      <title>The Salary of a Chief Security Officer</title>
      <description>
        <![CDATA[<p>The 24th annual Security and Compliance Compensation report gives industry professionals insight into what their peers are earning.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102069</guid>
      <pubDate>Tue, 13 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102069-the-salary-of-a-chief-security-officer</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F1-HERO-Slide-1440x750.webp?t=1768469520" type="image/jpeg" length="179508"/>
    </item>
    <item>
      <title>Why it’s Time to Move on From Legacy Access Control Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The modern workplace or campus looks very different from even a decade ago — and older access control systems struggle to keep up.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102057</guid>
      <pubDate>Thu, 08 Jan 2026 11:42:58 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102057-why-its-time-to-move-on-from-legacy-access-control-systems</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/sebastian-scholz-nuki-IJkSskfEqrM-unsplash.webp?t=1767896985" type="image/jpeg" length="70233"/>
    </item>
    <item>
      <title>Is Email the Entry Point to a Well-Rounded Disinformation Attack?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Email has always been the nervous system of business communication and is trusted, immediate and universal.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102065</guid>
      <pubDate>Thu, 08 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102065-is-email-the-entry-point-to-a-well-rounded-disinformation-attack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/brett-jordan-LPZy4da9aRo-unsplash-(1).webp?t=1769044794" type="image/jpeg" length="142611"/>
    </item>
    <item>
      <title>Compliance Theater: Why Cybersecurity’s Favorite Shakespearean Tragedy is Failing Us</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">IT security teams, especially the compliance cast, love drama. The slower, more arcane, and less intelligible the script, the louder the applause.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102062</guid>
      <pubDate>Tue, 06 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102062-compliance-theater-why-cybersecuritys-favorite-shakespearean-tragedy-is-failing-us</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/freestocks-I_pOqP6kCOI-unsplash-(5).webp?t=1769044796" type="image/jpeg" length="123978"/>
    </item>
    <item>
      <title>How Can CISOs Create the Ideal Cyber Budget? </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Here, <em>Security </em>magazine talks with Chris Wheeler, CISO at Resilience, about how CISOs can create the ideal cyber budget for the new year. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102046</guid>
      <pubDate>Tue, 30 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102046-how-can-cisos-create-the-ideal-cyber-budget</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/12/SEC_Web_5Minutes-Wheeler-1225_1170x658.webp?t=1765559331" type="image/jpeg" length="68256"/>
    </item>
    <item>
      <title>Louder Than Words: How Effective Security Defends Brand Reputation</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders can help defend their organization’s reputation through proper protective measures.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102045</guid>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102045-louder-than-words-how-effective-security-defends-brand-reputation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-F3-Feat-Slide1-1170x658.webp?t=1766527867" type="image/jpeg" length="46599"/>
    </item>
    <item>
      <title>Key Signs of Mental Health Struggles in Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>John Rodriguez, Founder of Empathic Security Cultures LLC, shares why mental health is so crucial in security.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102051</guid>
      <pubDate>Wed, 17 Dec 2025 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102051-key-signs-of-mental-health-struggles-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/16/Rodriguez-podcast-news-header.webp?t=1765904778" type="image/png" length="137029"/>
    </item>
    <item>
      <title>A Lack of AI Governance Leads to Additional Security Risks</title>
      <description>
        <![CDATA[<p>Security leaders need concrete AI guidelines to prevent risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102037</guid>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102037-a-lack-of-ai-governance-leads-to-additional-security-risks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-News1-Feat-Slide1-1170x658.webp?t=1765295964" type="image/jpeg" length="107871"/>
    </item>
    <item>
      <title>The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology</title>
      <author>edfinkel@earthlink.net (Ed Finkel)</author>
      <description>
        <![CDATA[<p>Security executives and guarding companies identify trends in security guarding throughout 2025, from political, executive protection challenges, violence, and theft.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102023</guid>
      <pubDate>Mon, 01 Dec 2025 07:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102023-the-2025-annual-guarding-report-unrest-inspires-upgrades-in-training-technology</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-F1-HERO-Slide-1440x750.webp?t=1766527866" type="image/jpeg" length="89680"/>
    </item>
  </channel>
</rss>
