<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Enterprise Services</title>
    <description>
      <![CDATA[Enterprise Services]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2835-enterprise-services</link>
    <language>en-us</language>
    <item>
      <title>Security’s 2025 Women in Security</title>
      <description>
        <![CDATA[<p>This year’s Women in Security honorees drive meaningful change within their organizations and help to shape the future of the security industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101739</guid>
      <pubDate>Mon, 07 Jul 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101739-securitys-2025-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/07-July/SEC-0725-F1-Intro-HERO-Slide-1440x750.webp?t=1752147912" type="image/jpeg" length="120564"/>
    </item>
    <item>
      <title>Security's Women in Security 2024</title>
      <description>
        <![CDATA[<p>This year's awardees are devoted change-makers in their organizations and the security industry as a whole.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100802</guid>
      <pubDate>Tue, 02 Jul 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100802-securitys-women-in-security-2024</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/07-July/SEC-0724-WIS-Hero-Slide1-1440x750.webp?t=1720868932" type="image/jpeg" length="117727"/>
    </item>
    <item>
      <title>Expanding the security candidate pool</title>
      <description>
        <![CDATA[<p>Expanding the security candidate pool is a critical step in better aligning security with the business and creating cross-functional teams.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99704</guid>
      <pubDate>Thu, 03 Aug 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99704-expanding-the-security-candidate-pool</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/July/SEC-0823-Candidate-Feat-Slide1-1170x658.webp?t=1690911856" type="image/jpeg" length="134390"/>
    </item>
    <item>
      <title>Security's Women in Security 2023</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security</em> magazine presents the honorees of our 2023 Women in Security program, representing the highest caliber of security leadership, dedication and skill within the security industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99549</guid>
      <pubDate>Wed, 05 Jul 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99549-securitys-women-in-security-2023</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/July/SEC-0723-WIS-Intro-Feat-Slide1-1170x658.webp?t=1689351308" type="image/jpeg" length="99768"/>
    </item>
    <item>
      <title>Make Change Your Password Day an impetus to boost overall cybersecurity</title>
      <author>andersonj@bnpmedia.com (Joy LePree Anderson)</author>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Experts suggest stronger cybersecurity solutions to strengthen resilience of businesses & critical infrastructure on Change Your Password Day.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98865</guid>
      <pubDate>Wed, 01 Feb 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98865-make-change-your-password-day-an-impetus-to-boost-overall-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/02/01/registration-g2340b92da_1920.webp?t=1675261487" type="image/jpeg" length="85034"/>
    </item>
    <item>
      <title>CISA provides guidelines to safeguard K-12 groups from cyber threats</title>
      <author>andersonj@bnpmedia.com (Joy LePree Anderson)</author>
      <description>
        <![CDATA[<p>CISA releases Protecting Our Future, which aims to support K-12 organizations with guidelines to prioritize their fight against cybersecurity risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98864</guid>
      <pubDate>Wed, 01 Feb 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98864-cisa-provides-guidelines-to-safeguard-k-12-groups-from-cyber-threats</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/02/01/classroom-gd68f282a8_1920.webp?t=1675259464" type="image/jpeg" length="146279"/>
    </item>
    <item>
      <title>The importance of keeping backup data safe from cybercriminals</title>
      <description>
        <![CDATA[<p>Immutability and air gapping provide effective ways to outsmart cybercriminals and defend against ransomware attacks that target vital backup data.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98823</guid>
      <pubDate>Mon, 30 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98823-the-importance-of-keeping-backup-data-safe-from-cybercriminals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/24/claudio-schwarz-fyeOxvYvIyY-unsplash.webp?t=1674576317" type="image/jpeg" length="67588"/>
    </item>
    <item>
      <title>Mitigating work-related stress for frontline security staff &amp; security screeners</title>
      <description>
        <![CDATA[<p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">Organizations with frontline security staff need a streamlined process for mitigating work-related stress to allow for fewer disruptions in daily security operations, and a more present and healthy security workforce. </span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98308</guid>
      <pubDate>Thu, 08 Sep 2022 11:45:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98308-mitigating-work-related-stress-for-frontline-security-staff-and-security-screeners</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/01/05/security-guard-gc77a8004f_1920.webp?t=1662651569" type="image/jpeg" length="214020"/>
    </item>
    <item>
      <title>Martin Gill — Most Influential People in Security 2022</title>
      <description>
        <![CDATA[<p>Martin Gill is focused on conducting meaningful security research projects that make a difference as well as aiding the industry in recognizing outstanding performance. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98260</guid>
      <pubDate>Thu, 01 Sep 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98260-martin-gill-most-influential-people-in-security-2022</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/September/SEC-0922-MIP-Martin-G-Feat_slide_1170x658.webp?t=1661966735" type="image/jpeg" length="102033"/>
    </item>
    <item>
      <title>Can your organization see an insider threat coming?</title>
      <description>
        <![CDATA[<p><span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Insider threats are particularly insidious because the risk is mostly unseen. But is it possible to know from their behaviors if someone is about to go rogue?</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/98016</guid>
      <pubDate>Tue, 19 Jul 2022 10:20:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/98016-can-your-organization-see-an-insider-threat-coming</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/insiders-freepik1170x658b.webp?t=1658239739" type="image/jpeg" length="248639"/>
    </item>
    <item>
      <title>Product spotlight on threat monitoring and risk assessment solutions</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine spotlights threat management and risk assessment solutions and tools for improved physical security operations. 
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97992</guid>
      <pubDate>Fri, 15 Jul 2022 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97992-product-spotlight-on-threat-monitoring-and-risk-assessment-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC-0722-Prod-Feat-Slide1-1170x658.webp?t=1658510172" type="image/jpeg" length="95606"/>
    </item>
    <item>
      <title>Addressing crisis management team burnout</title>
      <description>
        <![CDATA[<p><span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">What are seven tips and practical approaches security leaders and their organizations can use to keep crisis management response on track and burnout at bay? </span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97965</guid>
      <pubDate>Fri, 08 Jul 2022 11:10:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97965-addressing-crisis-management-team-burnout</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/burnout-freepik1170x658v60.webp?t=1657306434" type="image/jpeg" length="118405"/>
    </item>
    <item>
      <title>Women in Security 2022: Julia Sanya, Capital One</title>
      <description>
        <![CDATA[<p>Julia Sanya, Senior Manager, Enterprise Safety & Security at Capital One, built security in from the ground floor during a large-scale corporate construction project.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97898</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97898-women-in-security-2022-julia-sanya-capital-one</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC_WIS_J_Sanya-1170x658.webp?t=1656358219" type="image/jpeg" length="87390"/>
    </item>
    <item>
      <title>Women in Security 2022: Michelle La Plante, Deere &amp; Company</title>
      <description>
        <![CDATA[<p>Michelle La Plante, Global Security Manager at Deere & Company has a unique, well-rounded, holistic view of risk and intelligence thanks to her career journey thus far.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97895</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97895-women-in-security-2022-michelle-la-plante-deere-and-company</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC_WIS_Michell-La-1170x658.webp?t=1656358379" type="image/jpeg" length="90525"/>
    </item>
    <item>
      <title>Women in Security 2022: Paulette Henderson, Delta Air Lines</title>
      <description>
        <![CDATA[<p>Delta Air Lines’ General Manager of Corporate Security/Revenue Protection Unit Paulette Henderson has spent more than 35 years combatting fraud and protecting her employer’s assets.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97894</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97894-women-in-security-2022-paulette-henderson-delta-air-lines</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC_WIS_P-Henderson-1170x658.webp?t=1656358356" type="image/jpeg" length="91890"/>
    </item>
    <item>
      <title>Women in Security 2022: Bridget Guerrero, GoDaddy</title>
      <description>
        <![CDATA[<p>At GoDaddy, Bridget Guerrero has been a critical partner in helping the company build a safety, security and resilience program.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97890</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97890-women-in-security-2022-bridget-guerrero-godaddy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC_WIS_B-Guerrero-1170x658.webp?t=1656358329" type="image/jpeg" length="101564"/>
    </item>
    <item>
      <title>Women in Security 2022: Kimberly Cheatle, PepsiCo</title>
      <description>
        <![CDATA[<p>Kimberly Cheatle, Senior Director, Global Security at PepsiCo, thrives on helping to protect and support others, while providing risk mitigation strategies to ensure business continuity.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97889</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97889-women-in-security-2022-kimberly-cheatle-pepsico</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC_WIS_K_Cheatle-1170x658.webp?t=1656358312" type="image/jpeg" length="89343"/>
    </item>
    <item>
      <title>Women in Security 2022: Theresa Bentch, Garmin International</title>
      <description>
        <![CDATA[<p>Theresa Bentch, Director of Security, Environmental Health & Safety and IT Risk Assurance, is responsible for the safety and security of thousands of associates and visitors throughout 116 global sites at Garmin.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97886</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97886-women-in-security-2022-theresa-bentch-garmin-international</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC_WIS_T-Bentch-1170x658.webp?t=1656358284" type="image/jpeg" length="93067"/>
    </item>
    <item>
      <title>Security’s 2022 Women in Security </title>
      <author></author>
      <description>
        <![CDATA[<em>Security</em> magazine presents its annual Women in Security awards program, honoring women who have shaped the security function at their organizations and the industry as a whole. These professionals represent the depth, breadth and diversity that make up women across all functions, roles and responsibilities within the security industry.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97884</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97884-securitys-2022-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC-0722-WIS-Feat-Slide1-1170x658.webp?t=1657306435" type="image/jpeg" length="116279"/>
    </item>
    <item>
      <title>Commercial and military drones in Ukraine: The evolutionary use and implications on security and safety</title>
      <description>
        <![CDATA[<p><span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The experimentation with drone warfare in Ukraine has opened our eyes to what is possible with easily accessible platforms</span>. Security professionals <span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">must be mindful and prepared</span> for commercial drone security threats.</p><p> </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97695</guid>
      <pubDate>Wed, 25 May 2022 08:53:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97695-commercial-and-military-drones-in-ukraine-the-evolutionary-use-and-implications-on-security-and-safety</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/uav-drone-freepik1170.webp?t=1653483034" type="image/jpeg" length="200110"/>
    </item>
    <item>
      <title>Mitigating risk through holistic scenario-based training</title>
      <description>
        <![CDATA[<p>Scenario-based training allows security leaders to bring readiness to their organization while ensuring business continuity and resiliency when emergency situations arise.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96049</guid>
      <pubDate>Thu, 09 Sep 2021 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/96049-mitigating-risk-through-holistic-scenario-based-training</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/September/Scenario-based Training/SEC0621-Scenario-Feat-slide1_900px.webp?t=1631132927" type="image/jpeg" length="60031"/>
    </item>
    <item>
      <title>US to treat ransomware like terrorism</title>
      <description>
        <![CDATA[The U.S. Department of Justice (DOJ) is elevating investigations of ransomware attacks to a similar priority as terrorism, a senior official told Reuters. ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95366</guid>
      <pubDate>Mon, 07 Jun 2021 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95366-us-to-treat-ransomware-like-terrorism</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/ransomware-attack-freepik.webp?t=1623070482" type="image/jpeg" length="124916"/>
    </item>
    <item>
      <title>Microsoft warns of Russian Nobelium phishing campaign</title>
      <description>
        <![CDATA[Microsoft has warned that Nobelium is currently conducting a phishing campaign after the Russian-backed group managed to take control of the account used by USAID on the email marketing platform Constant Contact. The phishing campaign has targeted around 3,000 accounts linked to government agencies, think tanks, consultants, and non-governmental organizations.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95328</guid>
      <pubDate>Tue, 01 Jun 2021 11:13:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95328-microsoft-warns-of-russian-nobelium-phishing-campaign</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/phishing-freepik.webp?t=1629467488" type="image/jpeg" length="143618"/>
    </item>
    <item>
      <title>Mission-critical: Northern Virginia sets out to solve the cybersecurity workforce shortage</title>
      <author></author>
      <description>
        <![CDATA[<p>What the COVID-19 crisis is ultimately doing to the cybersecurity industry is shining a spotlight on the cybersecurity talent shortage. What is one of the only benefits of the critical issue, it&#39;s that it has allowed many in Northern Virginia to elevate and extend a slew of innovative measures that&nbsp;companies and region are implementing to combat the problem. As they set out to solve the industry talent shortage, Northern Virginia&nbsp;found the following strategies to be impactful steps in tandem toward a solution.</p>

<p>&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95293</guid>
      <pubDate>Wed, 26 May 2021 09:01:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95293-mission-critical-northern-virginia-sets-out-to-solve-the-cybersecurity-workforce-shortage</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/IT-security-cyber.webp?t=1621983758" type="image/jpeg" length="272553"/>
    </item>
    <item>
      <title>5 minutes with AJ Samuel – Why legal teams must quarterback data breach responses</title>
      <description>
        <![CDATA[<p>Data breach and privacy incidents occur daily at organizations of all sizes.&nbsp;It happens all too frequently. And while it is obvious that breaches continue impacting hundreds of thousands of lives, legal and compliance teams are not always brought in to manage each breach. With increased focus from regulators and law enforcement agencies to ensure organizations fulfill their obligations for post-breach notifications, legal teams can help quickly coordinate internal processes, and take swift action to begin the process of remediating damage and initiate immediate legal steps to protect the enterprise, and comply fully with all regulatory obligations. Here, we talk to AJ Samuel, co-Founder and Chief Product Officer at Exterro, about the many benefits of retaining legal counsel, who can better protect the integrity and confidentiality of the incident response.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95101</guid>
      <pubDate>Wed, 28 Apr 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95101-minutes-with-aj-samuel-why-legal-teams-must-quarterback-data-breach-responses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/5_minutes_with_Samuel_0421_900px.webp?t=1619551667" type="image/jpeg" length="66932"/>
    </item>
    <item>
      <title>Protective intelligence lessons from the U.S. Capitol riot for companies</title>
      <description>
        <![CDATA[After a lifetime in the protection business, the one constant in Washington that I’ve learned is that it takes tragedy to force change. The January 6 Capitol riot is not an enigma. This was a clear protective intelligence failure. The key finding of Retired Army LTG. Russel Honore’s report reviewing how the pillar of U.S. democracy could have been so easily infiltrated is that the U.S. Capitol Police (USCP) must better integrate intelligence into its operations through improved awareness, assessment, sharing, and response capabilities. We can look at effective protective intelligence as a three-part story: Act I is identifying threats; Act II is building those threats into a cohesive profile; Act III is sharing and acting on that information in order to make nothing happen. Applying this framework to January 6 helps us understand how we can and must do better and provides important takeaways for corporations.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95080</guid>
      <pubDate>Fri, 23 Apr 2021 11:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95080-protective-intelligence-lessons-from-the-us-capitol-riot-for-companies</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/us-capitol.webp?t=1619633684" type="image/jpeg" length="236926"/>
    </item>
    <item>
      <title>Staying healthy &amp; virus free digitally</title>
      <author></author>
      <description>
        <![CDATA[In the United States, February is often considered the last peak month of flu season. We are all accustomed to the unpleasant coughing fits and runny noses that accompany winter’s chill. However, in a turn of events, the common flu has been relatively uncommon across the country this winter. Instead, we continue to deal with the fallout from the far more contagious—and far less forgiving—SARS-CoV-2 virus. ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94989</guid>
      <pubDate>Fri, 09 Apr 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94989-staying-healthy-virus-free-digitally</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/remote-work-5.webp?t=1614179260" type="image/jpeg" length="146147"/>
    </item>
    <item>
      <title>Malicious cyber activity targeting critical SAP applications</title>
      <description>
        <![CDATA[SAP systems running outdated or misconfigured software are exposed to increased risks of malicious attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned. SAP applications help organizations manage critical business processes—such as enterprise resource planning, product lifecycle management, customer relationship management, and supply chain management.  ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94972</guid>
      <pubDate>Wed, 07 Apr 2021 10:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94972-malicious-cyber-activity-targeting-critical-sap-applications</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/cyber-software-freepik.webp?t=1617804079" type="image/jpeg" length="360333"/>
    </item>
    <item>
      <title>How women can break the cybersecurity glass ceiling - And why we need to help them</title>
      <description>
        <![CDATA[A 2019 S&P Global study found that public companies with women at the helm were more profitable compared to those with men in the CEO and CFO seats. Women are also making big inroads in other fields including science and medicine. Yet in the tech and cybersecurity industries women still lag behind. It’s certainly not because of a lack of jobs. Though the talent shortage did ease last year, the industry as a whole is struggling to fill vacancies. There are a few reasons that women aren’t filling those seats.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94971</guid>
      <pubDate>Wed, 07 Apr 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94971-how-women-can-break-the-cybersecurity-glass-ceiling---and-why-we-need-to-help-them</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/cyber-security-freepik-2.webp?t=1614968582" type="image/jpeg" length="448104"/>
    </item>
    <item>
      <title>The impact of COVID-19 on emergency communications</title>
      <author></author>
      <description>
        <![CDATA[<p>Amid the ongoing COVID-19 pandemic, prioritizing employee health, safety, and well-being will continue to be key to building resilience, continuity&nbsp;and operational readiness in 2021 and beyond. Accomplishing this requires a robust communications system across the enterprise.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94422</guid>
      <pubDate>Mon, 29 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94422-the-impact-of-covid-19-on-emergency-communications</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/speak-238488_1280.webp?t=1611350177" type="image/jpeg" length="107063"/>
    </item>
  </channel>
</rss>
