<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Management</title>
    <description>
      <![CDATA[Solutions for security enterprise leadership and management to enable the business.  ]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2786-management</link>
    <language>en-us</language>
    <item>
      <title>The Bench You'll Need in Three Years Depends on Decisions You Make Now</title>
      <description>
        <![CDATA[<p>Today’s hiring shortcut is tomorrow’s talent shortage.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102299</guid>
      <pubDate>Thu, 14 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709" type="image/png" length="302550"/>
    </item>
    <item>
      <title>Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Cybersecurity is no longer a function that can be delegated and reviewed after the fact.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102297</guid>
      <pubDate>Wed, 13 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Glowing-fibers-by-Luke-Jones.webp?t=1778673918" type="image/png" length="660440"/>
    </item>
    <item>
      <title>Top 2026 Security Conferences</title>
      <description>
        <![CDATA[<p style="box-sizing: border-box; font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px;"><em style="box-sizing: border-box;">Security&nbsp;</em>magazine offers a roundup of security conferences taking place in 2026.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102296</guid>
      <pubDate>Mon, 11 May 2026 13:46:26 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102296-top-2026-security-conferences</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/11/SEC_security-conferences-of-2026.webp?t=1778521334" type="image/jpeg" length="178058"/>
    </item>
    <item>
      <title>AI Will Tell Your Breach Story for the Next Two Years — Day One Decides What It Says</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102295</guid>
      <pubDate>Fri, 08 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Megaphone-by-Igor-Omilaev.webp?t=1778183697" type="image/png" length="664838"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Need to Think Like Business Leaders</title>
      <description>
        <![CDATA[<p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102288</guid>
      <pubDate>Wed, 06 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102288-cybersecurity-professionals-need-to-think-like-business-leaders</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516" type="image/png" length="448831"/>
    </item>
    <item>
      <title>Building Public/Private Partnerships That Actually Move the Needle</title>
      <description>
        <![CDATA[<p>Public and private sector partnerships strengthen security at every level.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102223</guid>
      <pubDate>Thu, 30 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102223-building-public-private-partnerships-that-actually-move-the-needle</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F4-Feat-Slide1-1170x658.webp?t=1775663758" type="image/jpeg" length="84465"/>
    </item>
    <item>
      <title>How Should Effective AI Red Teams Operate?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Dr. Peter Garraghan speaks with <em>Security </em>magazine about AI-specific red teaming.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102249</guid>
      <pubDate>Thu, 23 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102249-how-should-effective-ai-red-teams-operate</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/SEC_Web_5Minutes-Garraghan-0426_1170x658.webp?t=1776873919" type="image/jpeg" length="99911"/>
    </item>
    <item>
      <title>Why Bridging Siloes Doesn’t Need to Be Complicated</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Bruce McIndoe provides actionable steps for bridging siloes.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102240</guid>
      <pubDate>Wed, 22 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102240-why-bridging-siloes-doesnt-need-to-be-complicated</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/McIndoe-podcast-news-header.webp?t=1776785504" type="image/png" length="120498"/>
    </item>
    <item>
      <title>How CSOs Can Win Board Support for Gunshot Detection Technology</title>
      <description>
        <![CDATA[<p>How CSOs can win board support for gunshot detection technology.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102211</guid>
      <pubDate>Fri, 17 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102211-how-csos-can-win-board-support-for-gunshot-detection-technology</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F3-Feat-Slide1-1170x658.webp?t=1776895797" type="image/jpeg" length="69139"/>
    </item>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1776276357" type="image/png" length="470607"/>
    </item>
    <item>
      <title>How to Grow Your Cybersecurity Skills, According to Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How are cybersecurity professionals developing their career for the modern era?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102181</guid>
      <pubDate>Fri, 27 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102181-how-to-grow-your-cybersecurity-skills-according-to-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Young-man-working-on-laptop-in-coffee-shop-by-Miguel-Dominguez.webp?t=1774285182" type="image/png" length="621832"/>
    </item>
    <item>
      <title>What Does It Take to Be an Outstanding CSO or CISO?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, discusses what it takes to be a great CSO or CISO in the modern age.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102171</guid>
      <pubDate>Wed, 25 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102171-what-does-it-take-to-be-an-outstanding-cso-or-ciso</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/McHugh-podcast-news-header.webp?t=1773332170" type="image/png" length="132615"/>
    </item>
    <item>
      <title>Mexico Security Crisis: Never Waste a Crisis</title>
      <description>
        <![CDATA[<p>The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102185</guid>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102185-mexico-security-crisis-never-waste-a-crisis</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Four-people-in-suits-by-Vitaly-Gariev.webp?t=1773848065" type="image/png" length="428539"/>
    </item>
    <item>
      <title>Strategies for Security Leaders in the Midst of Skill Shortages</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em> Magazine, Chief Security & Trust Officer Kory Daniels shares how security leaders struggling with skill shortages can make strategic tradeoffs to lessen their team’s burden.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102142</guid>
      <pubDate>Wed, 25 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102142-strategies-for-security-leaders-in-the-midst-of-skill-shortages</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/20/Daniels-podcast-news-header.webp?t=1772642386" type="image/png" length="131691"/>
    </item>
    <item>
      <title>41% of Organizations Have Hired a Fake Candidate</title>
      <description>
        <![CDATA[<p>Deepfakes are leading to fraudulent job positions and hirings.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102140</guid>
      <pubDate>Mon, 23 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102140-41-of-organizations-have-hired-a-fake-candidate</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Global-News2-Slide2-1170x658.webp?t=1771603411" type="image/jpeg" length="139548"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>Security Insights Delivered Through Podcasts</title>
      <description>
        <![CDATA[<p>Listen in as security leaders discuss professional and personal stories from their security careers in episodes of Lock It Down with <em>Security</em>.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102118</guid>
      <pubDate>Wed, 18 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102118-security-insights-delivered-through-podcasts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Talk-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="210972"/>
    </item>
    <item>
      <title>Critical Thinking Erosion: A Hidden Threat to Security Career Resilience</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>While cybersecurity is vital, it is only one piece of the larger security puzzle.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102117</guid>
      <pubDate>Mon, 16 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102117-critical-thinking-erosion-a-hidden-threat-to-security-career-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Career-Feat-Slide1-1170x658.webp?t=1772041699" type="image/jpeg" length="153150"/>
    </item>
    <item>
      <title>Plenty of Associations, But Not Enough Association</title>
      <description>
        <![CDATA[<p>Thriving in the security industry could mean joining professional associations wisely.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102116</guid>
      <pubDate>Fri, 13 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102116-plenty-of-associations-but-not-enough-association</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-021.webp?t=1772041699" type="image/jpeg" length="83687"/>
    </item>
    <item>
      <title>Five Top Tips for Building a Strong Security Culture</title>
      <description>
        <![CDATA[<p>Courtney Hans, Vice President of Cyber Services at ANV, shares her top five tips for building a security-first organization.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102106</guid>
      <pubDate>Fri, 06 Feb 2026 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102106-five-top-tips-for-building-a-strong-security-culture</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F2-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="141185"/>
    </item>
    <item>
      <title>2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102101</guid>
      <pubDate>Wed, 28 Jan 2026 13:46:49 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102101-2026-enterprise-security-trends-what-leaders-must-prepare-for-in-an-interconnected-risk-landscape</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/nastuh-abootalebi-yWwob8kwOCk-unsplash-(1).webp?t=1769625646" type="image/jpeg" length="118868"/>
    </item>
    <item>
      <title>Why Your Security Team Needs to Hire Non-Traditional Professionals</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Aaron Walton, Threat Analyst at Expel, discusses&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">the value non-traditional professionals in cybersecurity.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102088</guid>
      <pubDate>Wed, 28 Jan 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102088-why-your-security-team-needs-to-hire-non-traditional-professionals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/20/Walton-podcast-news-header.webp?t=1768929115" type="image/png" length="124684"/>
    </item>
    <item>
      <title>The Inaugural Ed Chandler Security Innovation Award Presented to ADRM</title>
      <description>
        <![CDATA[<p>ADRM wins the first-ever Ed Chandler Security Innovation award at CONSULT 2025.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102085</guid>
      <pubDate>Fri, 23 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102085-the-inaugural-ed-chandler-security-innovation-award-presented-to-adrm</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F3-Feat-Slide1-1170x658.webp?t=1769626263" type="image/jpeg" length="71159"/>
    </item>
    <item>
      <title>What Background Checks Miss: The Human Layer Behind Modern Screening</title>
      <description>
        <![CDATA[<p>As background checks become more standard, they can run the risk of becoming less thorough.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102083</guid>
      <pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102083-what-background-checks-miss-the-human-layer-behind-modern-screening</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Edu-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="66133"/>
    </item>
    <item>
      <title>The Email Insider Threat Has Evolved in the Era of Generative AI</title>
      <description>
        <![CDATA[<p>Seemingly harmless tools such as AI grammar checkers pose a number of intellectual property risks</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102082</guid>
      <pubDate>Wed, 21 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102082-the-email-insider-threat-has-evolved-in-the-era-of-generative-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F4-Feat-Slide1-1170x658.webp?t=1769626265" type="image/jpeg" length="55439"/>
    </item>
    <item>
      <title>Private Sector Intelligence Careers</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>As corporate intelligence roles grow, gaps in analytic tradecraft education highlight the need for structured thinking and decision-support training.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102073</guid>
      <pubDate>Mon, 19 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102073-private-sector-intelligence-careers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Career-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="110926"/>
    </item>
    <item>
      <title>Escape Rooms, Mud Runs, and Game Nights: Cradles of Leadership?</title>
      <description>
        <![CDATA[<p>What team-building games can teach us about real leadership.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102072</guid>
      <pubDate>Fri, 16 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102072-escape-rooms-mud-runs-and-game-nights-cradles-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Leadership-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="121518"/>
    </item>
    <item>
      <title>Security’s New Year’s Resolution: Building Up the Next Generation</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How to build and retain the next generation of security leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102070</guid>
      <pubDate>Thu, 15 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102070-securitys-new-years-resolution-building-up-the-next-generation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F2-Feat-Slide1-1170x658.webp?t=1769626263" type="image/jpeg" length="61229"/>
    </item>
    <item>
      <title>The Salary of a Chief Security Officer</title>
      <description>
        <![CDATA[<p>The 24th annual Security and Compliance Compensation report gives industry professionals insight into what their peers are earning.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102069</guid>
      <pubDate>Tue, 13 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102069-the-salary-of-a-chief-security-officer</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F1-HERO-Slide-1440x750.webp?t=1768469520" type="image/jpeg" length="179508"/>
    </item>
  </channel>
</rss>
