<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/national-cyber-security-centre-ncsc" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in National-cyber-security-centre-ncsc ]]></title>
                <link>https://www.itpro.com/tag/national-cyber-security-centre</link>
        <description><![CDATA[ All the latest national-cyber-security-centre-ncsc content from the ITPro team ]]></description>
                                    <lastBuildDate>Thu, 23 Apr 2026 12:25:06 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ A ‘perfect storm’: NCSC chief issues warning over quantum threats, nation-state hackers, and the dangers of global ‘hacktivism’  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/a-perfect-storm-ncsc-chief-issues-warning-over-quantum-threats-nation-state-hackers-and-the-dangers-of-global-hacktivism</link>
                                                                            <description>
                            <![CDATA[ NCSC CEO Richard Horne says nation-state attacks, AI and the looming quantum threat require stronger global collaboration ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jkUTJkTdCc6AQEQJN3uNAB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 12:25:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:description>                                                            <media:text><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:text>
                                <media:title type="plain"><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NCSC says it’s time to switch to passkeys ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-ncsc-says-its-time-to-switch-to-passkeys</link>
                                                                            <description>
                            <![CDATA[ UK security organization calls for companies to step up and offer more secure ways to login ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jaYhRKhMTS3hbYHkehkCrY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 11:21:25 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:description>                                                            <media:text><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:text>
                                <media:title type="plain"><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC issues alert over Russian hacker campaign targeting SOHO routers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-issues-alert-over-russian-hacker-campaign-targeting-soho-routers</link>
                                                                            <description>
                            <![CDATA[ The APT28 group has exploited vulnerable internet routers to covertly reroute internet traffic through malicious servers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zMzke9FPNtPBx5CW9Pdyrb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Apr 2026 09:46:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:description>                                                            <media:text><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC names and shames pro-Russia hacktivist group amid escalating DDoS attacks on UK public services ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/ncsc-names-and-shames-pro-russia-hacktivist-group-amid-escalating-ddos-attacks-on-uk-public-services</link>
                                                                            <description>
                            <![CDATA[ Russia-linked hacktivists are increasingly trying to cause chaos for UK organizations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jqeUd8AcbExEp3jjXdxNS4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 20 Jan 2026 10:55:05 +0000</pubDate>                                                                                                                                <updated>Tue, 20 Jan 2026 10:55:10 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:description>                                                            <media:text><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK government launches industry 'ambassadors' scheme to champion software security improvements ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/uk-software-security-ambassadors-ncsc-code-of-practice</link>
                                                                            <description>
                            <![CDATA[ The Software Security Ambassadors scheme aims to boost software supply chains by helping organizations implement the Software Security Code of Practice. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hhoFwaLxMzvGZkMHzAcDMd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9ZT5mU7YeSN7Bg7YHh2LxX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 19 Jan 2026 10:47:23 +0000</pubDate>                                                                                                                                <updated>Mon, 19 Jan 2026 10:47:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9ZT5mU7YeSN7Bg7YHh2LxX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Female software developer coding in dark room with screen reflecting on glasses.]]></media:description>                                                            <media:text><![CDATA[Female software developer coding in dark room with screen reflecting on glasses.]]></media:text>
                                <media:title type="plain"><![CDATA[Female software developer coding in dark room with screen reflecting on glasses.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9ZT5mU7YeSN7Bg7YHh2LxX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NCSC touts honeypots and ‘cyber deception’ tactics as the key to combating hackers — but they could ‘lead to a false sense of security’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-ncsc-touts-honeypots-and-cyber-deception-tactics-as-the-key-to-combating-hackers-but-they-could-lead-to-a-false-sense-of-security</link>
                                                                            <description>
                            <![CDATA[ Trials to test the real-world effectiveness of cyber deception solutions have produced positive results so far ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AJVXYsVaQTvRxuHhuK2NXN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/kXhTUASnqmZC3EaLXqGUyb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 15 Dec 2025 11:45:49 +0000</pubDate>                                                                                                                                <updated>Mon, 15 Dec 2025 11:46:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/kXhTUASnqmZC3EaLXqGUyb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Male and female cybersecurity workers using AI tools on a desktop computer in a dimly-lit office space.]]></media:description>                                                            <media:text><![CDATA[Male and female cybersecurity workers using AI tools on a desktop computer in a dimly-lit office space.]]></media:text>
                                <media:title type="plain"><![CDATA[Male and female cybersecurity workers using AI tools on a desktop computer in a dimly-lit office space.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/kXhTUASnqmZC3EaLXqGUyb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Government urges large enterprises to shore up defenses as NCSC warns UK faces four 'nationally significant' cyber attacks every week ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/government-urges-large-enterprises-to-shore-up-defenses-as-ncsc-warns-uk-faces-four-nationally-significant-cyber-attacks-every-week</link>
                                                                            <description>
                            <![CDATA[ UK enterprises of all sizes face escalating cybersecurity threats, ministers have warned ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">52u76yJ7hRScQpLdyQhN5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dvYJkE4V4YUFg6s5Nvkq8H-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Oct 2025 10:31:43 +0000</pubDate>                                                                                                                                <updated>Tue, 14 Oct 2025 10:32:20 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dvYJkE4V4YUFg6s5Nvkq8H-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Westminster Parliament and the Big Ben clocktower pictured with Westminster Bridge.]]></media:description>                                                            <media:text><![CDATA[Westminster Parliament and the Big Ben clocktower pictured with Westminster Bridge.]]></media:text>
                                <media:title type="plain"><![CDATA[Westminster Parliament and the Big Ben clocktower pictured with Westminster Bridge.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dvYJkE4V4YUFg6s5Nvkq8H-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/industry-welcomes-the-ncscs-new-vulnerability-research-initiative-but-does-it-go-far-enough</link>
                                                                            <description>
                            <![CDATA[ The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">awQdzykcVf8Xojd7LjFFCA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 16 Jul 2025 14:36:54 +0000</pubDate>                                                                                                                                <updated>Wed, 16 Jul 2025 14:37:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NCSC just urged enterprises to ditch Windows 10 – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/windows/the-ncsc-just-urged-enterprises-to-ditch-windows-10-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The UK cyber agency says those that haven’t migrated to Windows 11 should do so immediately ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rBm57cuojr5CvowLhHaU6N</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/kNXojsonrZEBVQCVPPxCw6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 15 Jul 2025 10:43:28 +0000</pubDate>                                                                                                                                <updated>Tue, 15 Jul 2025 10:43:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Windows]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                    <category><![CDATA[Microsoft]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Bobby Hellard) ]]></author>                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/kNXojsonrZEBVQCVPPxCw6-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Windows 10 and Windows 11 logos pictured on laptop screens sitting side by side on a desk.]]></media:description>                                                            <media:text><![CDATA[Windows 10 and Windows 11 logos pictured on laptop screens sitting side by side on a desk.]]></media:text>
                                <media:title type="plain"><![CDATA[Windows 10 and Windows 11 logos pictured on laptop screens sitting side by side on a desk.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/kNXojsonrZEBVQCVPPxCw6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/states-dont-do-hacking-for-fun-ncsc-expert-urges-businesses-to-follow-geopolitics-as-defensive-strategy</link>
                                                                            <description>
                            <![CDATA[ Paul Chichester, director of operations at the UK’s National Cyber Security Centre, urged businesses to keep closer tabs on geopolitical events to gauge potential cyber threats. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tWmWKKmQCWqZdQFyWWxsaA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TLqJdzSrYCkAScByVUwGaF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Jun 2025 09:01:08 +0000</pubDate>                                                                                                                                <updated>Thu, 05 Jun 2025 09:01:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TLqJdzSrYCkAScByVUwGaF-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Russian hacker concept image showing a skulls and crossbones colored like the Russian Federation flag, made up of binary code, and imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Russian hacker concept image showing a skulls and crossbones colored like the Russian Federation flag, made up of binary code, and imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Russian hacker concept image showing a skulls and crossbones colored like the Russian Federation flag, made up of binary code, and imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TLqJdzSrYCkAScByVUwGaF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber attacks have rocked UK retailers – here's how you can stay safe ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cyber-attacks-have-rocked-uk-retailers-heres-how-you-can-stay-safe</link>
                                                                            <description>
                            <![CDATA[ Following recent attacks on retailers, the NCSC urges other firms to make sure they don't fall victim too ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">yvkJobyXPrCgsC3VwGxzXR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PqyG2CKVqrAxfQPt47jHN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 06 May 2025 09:45:09 +0000</pubDate>                                                                                                                                <updated>Tue, 06 May 2025 09:45:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PqyG2CKVqrAxfQPt47jHN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ClickFix social engineering technique concept image showing hand pressing a laptop keyboard button in low light.]]></media:description>                                                            <media:text><![CDATA[ClickFix social engineering technique concept image showing hand pressing a laptop keyboard button in low light.]]></media:text>
                                <media:title type="plain"><![CDATA[ClickFix social engineering technique concept image showing hand pressing a laptop keyboard button in low light.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PqyG2CKVqrAxfQPt47jHN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Five Eyes cyber agencies issue guidance on edge device vulnerabilities ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/five-eyes-cyber-agencies-issue-guidance-on-edge-device-vulnerabilities</link>
                                                                            <description>
                            <![CDATA[ Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">44gupsKEJXkvZessyUyQnN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/As3sJhQBLWiw9GhuFnV3f6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Feb 2025 08:20:00 +0000</pubDate>                                                                                                                                <updated>Thu, 06 Feb 2025 14:34:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/As3sJhQBLWiw9GhuFnV3f6-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ Future technology background glowing futuristic globe HUD, digital data flowing and network structure]]></media:description>                                                            <media:text><![CDATA[ Future technology background glowing futuristic globe HUD, digital data flowing and network structure]]></media:text>
                                <media:title type="plain"><![CDATA[ Future technology background glowing futuristic globe HUD, digital data flowing and network structure]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/As3sJhQBLWiw9GhuFnV3f6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ "Thinly spread": Questions raised over UK government’s latest cyber funding scheme ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/thinly-spread-questions-raised-over-uk-governments-latest-cyber-funding-scheme</link>
                                                                            <description>
                            <![CDATA[ The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sFJaLxh7kPdjUAGtcGH4HB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RytBMt57BpcZ3EQpS9yi4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Jan 2025 11:50:28 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Jan 2025 13:53:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ george.fitzmaurice@futurenet.com (George Fitzmaurice) ]]></author>                    <dc:creator><![CDATA[ George Fitzmaurice ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RytBMt57BpcZ3EQpS9yi4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[View of the Houses of Parliament, London, UK.]]></media:description>                                                            <media:text><![CDATA[View of the Houses of Parliament, London, UK.]]></media:text>
                                <media:title type="plain"><![CDATA[View of the Houses of Parliament, London, UK.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RytBMt57BpcZ3EQpS9yi4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ State-sponsored cyber crime is officially out of control ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/state-sponsored-cyber-crime-is-officially-out-of-control</link>
                                                                            <description>
                            <![CDATA[ North Korea is the most prolific attacker, but Russia and China account for the most disruptive and tightly-targeted campaigns ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MSC4TVH5sKyCNLV7UsKLPS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/x36eFsVMn7zTT8Pg9QZZhm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 16 Oct 2024 11:56:56 +0000</pubDate>                                                                                                                                <updated>Thu, 17 Oct 2024 10:41:29 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/x36eFsVMn7zTT8Pg9QZZhm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image showing a digitized padlock symbol on a digital interface.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image showing a digitized padlock symbol on a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image showing a digitized padlock symbol on a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/x36eFsVMn7zTT8Pg9QZZhm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NCSC and FBI just issued a major alert over a state-backed hacker group – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-ncsc-and-fbi-just-issued-a-major-alert-over-state-backed-hacker-groups-here-s-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ State-affiliated attackers are targeting individuals via spear-phishing techniques, according to the NCSC ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UsVi3w8ceTLy5HupueDrm9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rfyesh66wgmmCbpkKKZrYW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 30 Sep 2024 11:50:13 +0000</pubDate>                                                                                                                                <updated>Mon, 30 Sep 2024 13:19:04 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rfyesh66wgmmCbpkKKZrYW-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Iran]]></media:description>                                                            <media:text><![CDATA[Iran]]></media:text>
                                <media:title type="plain"><![CDATA[Iran]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rfyesh66wgmmCbpkKKZrYW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK's data protection watchdog deepens cooperation with National Crime Agency ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/uk-s-data-protection-watchdog-deepens-cooperation-with-national-crime-agency</link>
                                                                            <description>
                            <![CDATA[ The two bodies want to improve the support given to organizations experiencing cyber attacks and ransomware recovery ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">575tSDTARjuuKo7qW4Paib</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Sep 2024 05:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Mockup image with padlocks to symbolise a cyber security vulnerability]]></media:description>                                                            <media:text><![CDATA[Mockup image with padlocks to symbolise a cyber security vulnerability]]></media:text>
                                <media:title type="plain"><![CDATA[Mockup image with padlocks to symbolise a cyber security vulnerability]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NCSC wants to know how your business is using honeypots to combat hackers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-ncsc-wants-to-know-how-your-business-is-using-honeypots-to-combat-hackers</link>
                                                                            <description>
                            <![CDATA[ The NCSC hopes to encourage the use of cyber deception techniques within the UK, across government and critical national infrastructure ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">S3nkgiMWnRvgrJTEjRvWEF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 14 Aug 2024 08:50:50 +0000</pubDate>                                                                                                                                <updated>Wed, 14 Aug 2024 10:07:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:description>                                                            <media:text><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:text>
                                <media:title type="plain"><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC Active Cyber Defence 2.0 refresh looks to tailor services to the security market and threat landscape ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncscs-active-cyber-defence-20-refresh-looks-to-tailor-services-to-the-evolving-security-market-and-threat-landscape</link>
                                                                            <description>
                            <![CDATA[ The NCSC plans to update its Active Cyber Defence program, introducing a refresh to keep the initiative up to date with the current threat landscape ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mDdA2fiEPpWthnJKbw8Ns4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 02 Aug 2024 11:34:49 +0000</pubDate>                                                                                                                                <updated>Mon, 05 Aug 2024 15:28:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:description>                                                            <media:text><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:text>
                                <media:title type="plain"><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is the National Cyber Security Centre (NCSC) and what does it do? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/what-is-the-national-cyber-security-centre-ncsc-and-what-does-it-do</link>
                                                                            <description>
                            <![CDATA[ The NCSC plays a critical role in keeping the UK safe from cyber attacks, but can also help businesses get ahead of attacks through strategic changes ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9nbCkmpygLhsnZkuSZujyB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 29 May 2024 12:11:46 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Jun 2024 11:44:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:description>                                                            <media:text><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:text>
                                <media:title type="plain"><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC CTO says what everyone is thinking about software security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/the-ncscs-cto-just-said-what-is-thinking-about-software-security</link>
                                                                            <description>
                            <![CDATA[ UK tech firms are building secure software products, but the current state of the market means they're not fully rewarded for doing so ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8Nq5gu9ukQk2nFmPbFmYej</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2GhNhXCSPdGYMPqCL4uMS9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 May 2024 13:00:16 +0000</pubDate>                                                                                                                                <updated>Fri, 17 May 2024 12:46:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2GhNhXCSPdGYMPqCL4uMS9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digitized padlock with binary code placed over a circuit board signifying secure software development and security pratices.]]></media:description>                                                            <media:text><![CDATA[Digitized padlock with binary code placed over a circuit board signifying secure software development and security pratices.]]></media:text>
                                <media:title type="plain"><![CDATA[Digitized padlock with binary code placed over a circuit board signifying secure software development and security pratices.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2GhNhXCSPdGYMPqCL4uMS9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What you need to know about the new NCSC ransomware guidance ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/what-you-need-to-know-about-the-new-ncsc-ransomware-guidance</link>
                                                                            <description>
                            <![CDATA[ The new ransomware guidance from the NCSC has been developed in collaboration with major insurance bodies, and warns against paying up in the event of an attack ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">E3TU6SaJeQ3S6DVcXDsRPH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 May 2024 10:05:54 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:description>                                                            <media:text><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:text>
                                <media:title type="plain"><![CDATA[A logo is displayed on a television screen in the National Cyber Security Centre (NCSC) on February 14, 2017 in London, England]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QyZfGkLbNUbuuxodAzsuFU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is hackbot as a service and are malicious LLMs a risk? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/what-is-hackbot-as-a-service-and-are-malicious-llms-a-risk</link>
                                                                            <description>
                            <![CDATA[ As threat actors begin to use malicious chatbots, hackbot as a service groups are helping affiliates launch tailored attacks via subscription ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">coL7zwZtofgEvqeFSkjCmL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/kx7LDWje6sTgxesFZVxQZV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 May 2024 12:17:26 +0000</pubDate>                                                                                                                                <updated>Thu, 09 May 2024 16:56:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/kx7LDWje6sTgxesFZVxQZV-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An orange, fragmented digital avatar representing hackbots and the hackbot as a service model. Hexagonal lens flares and strands representing connections with users are splintering around the avatar.]]></media:description>                                                            <media:text><![CDATA[An orange, fragmented digital avatar representing hackbots and the hackbot as a service model. Hexagonal lens flares and strands representing connections with users are splintering around the avatar.]]></media:text>
                                <media:title type="plain"><![CDATA[An orange, fragmented digital avatar representing hackbots and the hackbot as a service model. Hexagonal lens flares and strands representing connections with users are splintering around the avatar.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/kx7LDWje6sTgxesFZVxQZV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security agencies warn of heightened threat to critical national infrastructure ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/security-agencies-warn-of-heightened-threat-to-critical-national-infrastructure</link>
                                                                            <description>
                            <![CDATA[ The NCSC and CISA say that pro-Russia hacktivists are targeting under-protected industrial control systems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ojLa3bMmXChk2Fk9wdFTkX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/nYTQnscZmBWjF97ciGDC9T-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 May 2024 10:06:15 +0000</pubDate>                                                                                                                                <updated>Fri, 03 May 2024 10:06:35 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/nYTQnscZmBWjF97ciGDC9T-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cloud security concept image showing digitized cloud symbol on a circuit board with data flowing out of the cloud.]]></media:description>                                                            <media:text><![CDATA[Cloud security concept image showing digitized cloud symbol on a circuit board with data flowing out of the cloud.]]></media:text>
                                <media:title type="plain"><![CDATA[Cloud security concept image showing digitized cloud symbol on a circuit board with data flowing out of the cloud.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/nYTQnscZmBWjF97ciGDC9T-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC appoints new CEO ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-appoints-new-ceo</link>
                                                                            <description>
                            <![CDATA[ Richard Horne will join the organisation from PwC, where he currently chairs the company's cyber security practice ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Lrjr4ud5dAYRDfERVP6Exi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mxa4MjpRrkEMJ948C9JDCo-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 22 Apr 2024 13:55:44 +0000</pubDate>                                                                                                                                <updated>Mon, 22 Apr 2024 16:04:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mxa4MjpRrkEMJ948C9JDCo-1280-80.jpg">
                                                            <media:credit><![CDATA[National Cyber Security Centre (NCSC)]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A head and shoulders photo of Richard Horne, the new CEO of the NCSC]]></media:description>                                                            <media:text><![CDATA[A head and shoulders photo of Richard Horne, the new CEO of the NCSC]]></media:text>
                                <media:title type="plain"><![CDATA[A head and shoulders photo of Richard Horne, the new CEO of the NCSC]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mxa4MjpRrkEMJ948C9JDCo-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ SCADA is heading to the cloud — here's why security experts are worried ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/scada-is-heading-to-the-cloud-heres-why-security-experts-are-worried</link>
                                                                            <description>
                            <![CDATA[ SCADA systems are increasingly migrating to cloud environments, but the NCSC worries security is often an afterthought ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">q7YVh4iDaFr7mfeS8zPKWb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NaiGBURS97tX5xnCYwTUt3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 27 Mar 2024 08:45:55 +0000</pubDate>                                                                                                                                <updated>Wed, 27 Mar 2024 15:31:04 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                                    <dc:creator><![CDATA[ Steve Ranger ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/NaiGBURS97tX5xnCYwTUt3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IT technician operating a SCADA industrial control system at a computer station.]]></media:description>                                                            <media:text><![CDATA[IT technician operating a SCADA industrial control system at a computer station.]]></media:text>
                                <media:title type="plain"><![CDATA[IT technician operating a SCADA industrial control system at a computer station.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NaiGBURS97tX5xnCYwTUt3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Seven things every chief exec needs to know in the event of a cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/seven-things-every-chief-exec-needs-to-know-in-the-event-of-a-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ New guidance from the NCSC aims to provide CEO's with vital learning materials to draw upon if their organization suffers a cyber attack ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CgEfeQwsp2KXaHmSBhWeSH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RedwCmfxCPMtSW8N8UwyxY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 25 Mar 2024 13:53:12 +0000</pubDate>                                                                                                                                <updated>Mon, 25 Mar 2024 16:09:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RedwCmfxCPMtSW8N8UwyxY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber security leadership team discussing an incident in an open plan office space in low light.]]></media:description>                                                            <media:text><![CDATA[Cyber security leadership team discussing an incident in an open plan office space in low light.]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber security leadership team discussing an incident in an open plan office space in low light.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RedwCmfxCPMtSW8N8UwyxY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Former NCSC chief calls for ransomware payments ban, but cyber security experts aren't keen ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/former-ncsc-chief-calls-for-ransomware-payments-ban-but-cyber-security-experts-arent-keen</link>
                                                                            <description>
                            <![CDATA[ Ciaran Martin, former chief executive at the NCSC, said efforts to introduce a ransomware payments ban could help tackle the $20 billion industry ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Sg6bemHkXAET7Gcp8q63UT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tZDrEXZkF2owJPisgEeQF6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 04 Mar 2024 13:20:06 +0000</pubDate>                                                                                                                                <updated>Mon, 04 Mar 2024 14:41:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tZDrEXZkF2owJPisgEeQF6-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ciaran Martin, former head of the National Cyber Security Centre (NCSC), speaks during the 2018 Aspen Cyber Summit in San Francisco, California, U.S., on Thursday, Nov. 8, 2018]]></media:description>                                                            <media:text><![CDATA[Ciaran Martin, former head of the National Cyber Security Centre (NCSC), speaks during the 2018 Aspen Cyber Summit in San Francisco, California, U.S., on Thursday, Nov. 8, 2018]]></media:text>
                                <media:title type="plain"><![CDATA[Ciaran Martin, former head of the National Cyber Security Centre (NCSC), speaks during the 2018 Aspen Cyber Summit in San Francisco, California, U.S., on Thursday, Nov. 8, 2018]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tZDrEXZkF2owJPisgEeQF6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ State-linked threat actors are ramping up attacks on cloud services - here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/state-linked-threat-actors-are-ramping-up-attacks-on-cloud-services-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ Attacks on cloud-hosted environments are escalating rapidly, according to a new advisory from the NCSC and international partners ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Q3B952TpVCJrZUsz8K2DzH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6J7qLSiKJDwawdKHyL5x56-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 27 Feb 2024 11:05:37 +0000</pubDate>                                                                                                                                <updated>Tue, 27 Feb 2024 12:02:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6J7qLSiKJDwawdKHyL5x56-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cloud security concept image showing a digitalized cloud symbol with a padlock sitting on a circuit board.]]></media:description>                                                            <media:text><![CDATA[Cloud security concept image showing a digitalized cloud symbol with a padlock sitting on a circuit board.]]></media:text>
                                <media:title type="plain"><![CDATA[Cloud security concept image showing a digitalized cloud symbol with a padlock sitting on a circuit board.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6J7qLSiKJDwawdKHyL5x56-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Five Eyes advisory raises alarm over state-backed 'living off the land' attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/five-eyes-advisory-raises-alarm-over-state-backed-living-off-the-land-attacks</link>
                                                                            <description>
                            <![CDATA[ State-backed actors may be lurking in critical infrastructure systems, security agencies have warned ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6JNHdk6EVRovNF4AYzoQUd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/H3JvMkkKnU6yR4egdg39DW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Feb 2024 11:45:00 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Feb 2024 14:41:29 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/H3JvMkkKnU6yR4egdg39DW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber criminal concept art featuring a digitized eye on a binary code background]]></media:description>                                                            <media:text><![CDATA[Cyber criminal concept art featuring a digitized eye on a binary code background]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber criminal concept art featuring a digitized eye on a binary code background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/H3JvMkkKnU6yR4egdg39DW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Struggling with mandatory password change policies? Here's the most effective way to get stubborn employees to comply ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/researchers-at-uc-san-diego-reveal-the-most-effective-way-to-get-stubborn-employees-to-change-their-passwords</link>
                                                                            <description>
                            <![CDATA[ The study involved monitoring email reminders and login prompts sent to almost 10,000 faculty and staff members ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">F3pHUR34byzmQFT2meUcE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xvgNnkx6pAN9JWe8n5vPu7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 02 Feb 2024 11:27:03 +0000</pubDate>                                                                                                                                <updated>Wed, 14 Feb 2024 08:22:47 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xvgNnkx6pAN9JWe8n5vPu7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A login screen of an application showing empty username and password fields]]></media:description>                                                            <media:text><![CDATA[A login screen of an application showing empty username and password fields]]></media:text>
                                <media:title type="plain"><![CDATA[A login screen of an application showing empty username and password fields]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xvgNnkx6pAN9JWe8n5vPu7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A king's ransom-ware:Buckingham Palace is on the hunt for two cyber security pros to join the Royal Household ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/careers-and-training/a-kings-ransom-ware-buckingham-palace-is-on-the-hunt-for-two-cyber-security-pros-to-join-the-royal-household</link>
                                                                            <description>
                            <![CDATA[ The Royal Household is looking for cyber security and information security managers to keep the Palace safe ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gdGKNa3R3oMpWfNxN4RfLf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tTViZW3kqsoYoU4pvWf5xH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 30 Jan 2024 11:35:56 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Feb 2024 18:19:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Careers and Training]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tTViZW3kqsoYoU4pvWf5xH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A photo of the Queen Victoria Memorial with Buckingham Palace in the background on a bright sunny day]]></media:description>                                                            <media:text><![CDATA[A photo of the Queen Victoria Memorial with Buckingham Palace in the background on a bright sunny day]]></media:text>
                                <media:title type="plain"><![CDATA[A photo of the Queen Victoria Memorial with Buckingham Palace in the background on a bright sunny day]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tTViZW3kqsoYoU4pvWf5xH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Three Kent councils grapple with cyber incidents as services knocked offline ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/three-kent-councils-grapple-with-cyber-incidents-as-services-knocked-offline</link>
                                                                            <description>
                            <![CDATA[ Affected local authorities said they have taken swift action to contain the incidents, but warned that services may be unavailable ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">C8pUZmvTWy9Geykk3gyiWo</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Q78FXEQYdWxt9sQ9poVpxb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 Jan 2024 12:53:09 +0000</pubDate>                                                                                                                                <updated>Fri, 19 Jan 2024 12:53:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Q78FXEQYdWxt9sQ9poVpxb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Binary digital security padlock and network data on a huge cyberspace]]></media:description>                                                            <media:text><![CDATA[Binary digital security padlock and network data on a huge cyberspace]]></media:text>
                                <media:title type="plain"><![CDATA[Binary digital security padlock and network data on a huge cyberspace]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Q78FXEQYdWxt9sQ9poVpxb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Inside the NCSC’s plan to create a national threat tracking A-Team ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/inside-the-ncscs-plan-to-create-a-national-threat-tracking-a-team</link>
                                                                            <description>
                            <![CDATA[ The NCSC Cyber League program looks to draw on the strengths of the country’s security industry and bolster national resilience ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MVnERSstz9CCVcT7Nm8CuK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vPCNaKE7odWDJST3pzLbAg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Jan 2024 13:10:37 +0000</pubDate>                                                                                                                                <updated>Fri, 19 Jan 2024 13:51:15 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vPCNaKE7odWDJST3pzLbAg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[National Cyber Security Centre (NCSC) logo displayed on a television screen.]]></media:description>                                                            <media:text><![CDATA[National Cyber Security Centre (NCSC) logo displayed on a television screen.]]></media:text>
                                <media:title type="plain"><![CDATA[National Cyber Security Centre (NCSC) logo displayed on a television screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vPCNaKE7odWDJST3pzLbAg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC launches new cyber guidance for SMBs as threats continue to rise ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-launches-new-cyber-guidance-for-smbs-as-threats-continue-to-surge</link>
                                                                            <description>
                            <![CDATA[ The NCSC said new cyber guidance for SMBs will help firms navigate an increasingly perilous threat landscape in which hackers are ramping up attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BS75N4pP4nrX2pdbarepQC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 12 Jan 2024 13:06:02 +0000</pubDate>                                                                                                                                <updated>Fri, 19 Jan 2024 15:13:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:description>                                                            <media:text><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:text>
                                <media:title type="plain"><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What are the most-targeted industries for cyber attacks? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/what-are-the-most-targeted-industries-for-cyber-attacks</link>
                                                                            <description>
                            <![CDATA[ What makes the most-targeted industries for cyber attacks such common victims, and what can they do to shore up security? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VMSRAfWimDswsXm9yLaaeR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/HEuPZ3MHXKEfCnnXvCLP2j-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 18 Dec 2023 14:40:40 +0000</pubDate>                                                                                                                                <updated>Mon, 18 Dec 2023 17:17:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/HEuPZ3MHXKEfCnnXvCLP2j-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An industrial engineer standing outdoors, his face is lit by the light from a laptop and a power station blurred in the background. He is wearing a hard hat and high-vis jacket over an orange jumper.]]></media:description>                                                            <media:text><![CDATA[An industrial engineer standing outdoors, his face is lit by the light from a laptop and a power station blurred in the background. He is wearing a hard hat and high-vis jacket over an orange jumper.]]></media:text>
                                <media:title type="plain"><![CDATA[An industrial engineer standing outdoors, his face is lit by the light from a laptop and a power station blurred in the background. He is wearing a hard hat and high-vis jacket over an orange jumper.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/HEuPZ3MHXKEfCnnXvCLP2j-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The end of ransomware payments: How businesses fit into the fight ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/the-end-of-ransomware-payments-how-businesses-fit-into-the-fight</link>
                                                                            <description>
                            <![CDATA[ Governments worldwide have determined to stop ransomware payments, but what does this mean for businesses? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cKtAaAcXzNALEYPpEMKnnG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ELrPPh37SP8EyPNn5MWMYT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 11 Dec 2023 13:12:40 +0000</pubDate>                                                                                                                                <updated>Fri, 23 Feb 2024 09:15:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ELrPPh37SP8EyPNn5MWMYT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI render of a metal safe representing ransomware payments, viewed from an isometric angle and placed against a dark grey background resembling a motherboard. At the bottom of the safe, gold pins like on a chip can be seen, and four blue lines of light emanate from each side of the square safe.]]></media:description>                                                            <media:text><![CDATA[A CGI render of a metal safe representing ransomware payments, viewed from an isometric angle and placed against a dark grey background resembling a motherboard. At the bottom of the safe, gold pins like on a chip can be seen, and four blue lines of light emanate from each side of the square safe.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI render of a metal safe representing ransomware payments, viewed from an isometric angle and placed against a dark grey background resembling a motherboard. At the bottom of the safe, gold pins like on a chip can be seen, and four blue lines of light emanate from each side of the square safe.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ELrPPh37SP8EyPNn5MWMYT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC Cyber Incident Exercising scheme looks to fine-tune incident response ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-cyber-incident-exercising-scheme-looks-to-fine-tune-incident-response</link>
                                                                            <description>
                            <![CDATA[ The NCSC Cyber Incident Exercising scheme will offer bespoke, structured table-top or live-play cyber incident exercises ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">SXTLQeSEpLLY83Rthx9pg9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 05 Dec 2023 13:11:07 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Jun 2024 11:45:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:description>                                                            <media:text><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:text>
                                <media:title type="plain"><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber risk to the UK's water network, NCSC warns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-warns-of-cyber-risk-to-the-uks-water-network</link>
                                                                            <description>
                            <![CDATA[ The cyber security agency is advising water companies to take action following an attack on a facility in the US ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">P4rKbDTby8gbJn4R2td67A</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/A4izkxrQ38gsj4MhfU9t66-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 Dec 2023 13:35:40 +0000</pubDate>                                                                                                                                <updated>Fri, 01 Dec 2023 17:11:31 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/A4izkxrQ38gsj4MhfU9t66-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A photo of the outside of Daveyhulme wastewater treatment plant showing a large building surrounded by large white pipes]]></media:description>                                                            <media:text><![CDATA[A photo of the outside of Daveyhulme wastewater treatment plant showing a large building surrounded by large white pipes]]></media:text>
                                <media:title type="plain"><![CDATA[A photo of the outside of Daveyhulme wastewater treatment plant showing a large building surrounded by large white pipes]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/A4izkxrQ38gsj4MhfU9t66-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC: AI will increase speed and scale of critical infrastructure attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-ai-will-increase-speed-and-scale-of-critical-infrastructure-attacks</link>
                                                                            <description>
                            <![CDATA[ The NCSC Annual Review suggests AI-related threats to national infrastructure are growing ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">V8Z4tXxm4PyKMgLBkvk98B</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Nov 2023 12:36:29 +0000</pubDate>                                                                                                                                <updated>Tue, 14 Nov 2023 16:45:18 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:description>                                                            <media:text><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:text>
                                <media:title type="plain"><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK’s NCSC names Ollie Whitehouse as its new CTO ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/public-sector/uks-ncsc-names-ollie-whitehouse-as-its-new-cto</link>
                                                                            <description>
                            <![CDATA[ Whitehouse has called for better public-private information sharing over cyber threats ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">GtoMS3QpLUY9SkURshLVcf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GgocSx85TsNe8XYXjMyQB7-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Thu, 31 Aug 2023 23:01:00 +0000</pubDate>                                                                                                                                <updated>Mon, 04 Sep 2023 10:03:58 +0000</updated>
                                                                                                                                            <category><![CDATA[Public Sector]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/GgocSx85TsNe8XYXjMyQB7-1280-80.png">
                                                            <media:credit><![CDATA[UK NCSC]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NCSC CTO Ollie Whitehouse headshot]]></media:description>                                                            <media:text><![CDATA[NCSC CTO Ollie Whitehouse headshot]]></media:text>
                                <media:title type="plain"><![CDATA[NCSC CTO Ollie Whitehouse headshot]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GgocSx85TsNe8XYXjMyQB7-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC, SBU reveal overt Russian cyber campaign as cyber war continues to evolve ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/ncsc-sbu-reveal-overt-russian-cyber-campaign-as-cyber-war-continues-to-evolve</link>
                                                                            <description>
                            <![CDATA[ Sandworm-linked threat actors gained access to battlefield tablets ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Y82NppLgZ7zP4DpTwWToDc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/EmPpjivS5QagLQf2iQgm9n-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 31 Aug 2023 11:59:01 +0000</pubDate>                                                                                                                                <updated>Thu, 31 Aug 2023 12:44:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/EmPpjivS5QagLQf2iQgm9n-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A Ukrainian military member holds a smartphone, with a residential building in the background. They are based in Donetsk Oblast, Ukraine.]]></media:description>                                                            <media:text><![CDATA[A Ukrainian military member holds a smartphone, with a residential building in the background. They are based in Donetsk Oblast, Ukraine.]]></media:text>
                                <media:title type="plain"><![CDATA[A Ukrainian military member holds a smartphone, with a residential building in the background. They are based in Donetsk Oblast, Ukraine.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/EmPpjivS5QagLQf2iQgm9n-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Expert: UK cyber security programme for students is “excellent” introduction to the field ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/careers-and-training/expert-uk-cyber-security-programme-for-students-is-excellent-introduction-to-the-field</link>
                                                                            <description>
                            <![CDATA[ Through Cyber Explorers, DSIT and the NCSC aim to empower youths and prevent them from going down the path of hacking ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qsjqHckcXiMdaDr2VBUmy</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/HzGWXS8b5hdkqT9oha5JvA-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 21 Aug 2023 12:40:11 +0000</pubDate>                                                                                                                                <updated>Mon, 21 Aug 2023 15:22:25 +0000</updated>
                                                                                                                                            <category><![CDATA[Careers and Training]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/HzGWXS8b5hdkqT9oha5JvA-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Two students with headphones in leaning in to look at laptop screens in an IT lesson, with more laptops closer to the camera but out of focus.]]></media:description>                                                            <media:text><![CDATA[Two students with headphones in leaning in to look at laptop screens in an IT lesson, with more laptops closer to the camera but out of focus.]]></media:text>
                                <media:title type="plain"><![CDATA[Two students with headphones in leaning in to look at laptop screens in an IT lesson, with more laptops closer to the camera but out of focus.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/HzGWXS8b5hdkqT9oha5JvA-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC expands incident response scheme to support smaller at-risk organizations ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-expands-incident-response-scheme-to-support-smaller-at-risk-organizations</link>
                                                                            <description>
                            <![CDATA[ Charities, small public sector organizations, and local authorities will be covered by the expanded scheme ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">L2N5DjgwU7o2r2MomFd8DT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 17 Aug 2023 11:06:22 +0000</pubDate>                                                                                                                                <updated>Thu, 17 Aug 2023 13:18:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:description>                                                            <media:text><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:text>
                                <media:title type="plain"><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Electoral Commission hit by ‘complex’ 15-month cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/electoral-commission-hit-by-complex-15-month-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals, who first breached the organization’s systems in August 2021, were identified in October last year ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Gi5dLkPnfAZJDYYdgfM47U</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bMrMpeGHAcJtiRYA53sF3o-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 08 Aug 2023 15:33:56 +0000</pubDate>                                                                                                                                <updated>Wed, 16 Aug 2023 15:17:27 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bMrMpeGHAcJtiRYA53sF3o-1280-80.jpg">
                                                            <media:credit><![CDATA[n/a]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Parliament]]></media:description>                                                            <media:text><![CDATA[Parliament]]></media:text>
                                <media:title type="plain"><![CDATA[Parliament]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bMrMpeGHAcJtiRYA53sF3o-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Top 12 most-exploited security vulnerabilities revealed by national cyber security agencies ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/top-12-most-exploited-security-vulnerabilities-revealed-by-national-cyber-security-agencies</link>
                                                                            <description>
                            <![CDATA[ Cyber leaders from the Five Eyes alliance said attackers favor older vulnerabilities rather than new ones ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wnJsKARtb4pSe6K68N64Ye</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 03 Aug 2023 15:45:41 +0000</pubDate>                                                                                                                                <updated>Fri, 04 Aug 2023 10:28:18 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Top 12 most-exploited security vulnerabilities: NCSC logo superimposed with a translucent background in front of an office building]]></media:description>                                                            <media:text><![CDATA[Top 12 most-exploited security vulnerabilities: NCSC logo superimposed with a translucent background in front of an office building]]></media:text>
                                <media:title type="plain"><![CDATA[Top 12 most-exploited security vulnerabilities: NCSC logo superimposed with a translucent background in front of an office building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Latest arrest places LockBit firmly in the crosshairs of international cyber police ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/latest-arrest-places-lockbit-firmly-in-the-crosshairs-of-international-cyber-police</link>
                                                                            <description>
                            <![CDATA[ The threat group could be set for a fate reminiscent of REvil ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qrqPa7cUe6Fh9RxpT8mK3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QjQPtphwjrZ4skepjhdLWn-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 16 Jun 2023 11:41:26 +0000</pubDate>                                                                                                                                <updated>Mon, 19 Jun 2023 10:33:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QjQPtphwjrZ4skepjhdLWn-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[LockBit: A podium bearing the seal of the Department of Justice (an eagle carrying the US flag and a sprig of leaves) in the foreground, with two flags out of focus in the background (the US on the left, a flag bearing the seal on the right).]]></media:description>                                                            <media:text><![CDATA[LockBit: A podium bearing the seal of the Department of Justice (an eagle carrying the US flag and a sprig of leaves) in the foreground, with two flags out of focus in the background (the US on the left, a flag bearing the seal on the right).]]></media:text>
                                <media:title type="plain"><![CDATA[LockBit: A podium bearing the seal of the Department of Justice (an eagle carrying the US flag and a sprig of leaves) in the foreground, with two flags out of focus in the background (the US on the left, a flag bearing the seal on the right).]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QjQPtphwjrZ4skepjhdLWn-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is ethical hacking? White hat hackers explained ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained</link>
                                                                            <description>
                            <![CDATA[ As new threats emerge, ethical hacking can be a boon to any organization ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bpoPa8r7TprsWvjycuh88f</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cRCmj2pB8NpGuYsXxFKLWo-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 11 Jul 2019 11:25:00 +0000</pubDate>                                                                                                                                <updated>Tue, 06 Aug 2024 16:19:27 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ David Howell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cRCmj2pB8NpGuYsXxFKLWo-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[Hackers]]></media:description>                                                            <media:text><![CDATA[A graphic displaying an ethical hacker]]></media:text>
                                <media:title type="plain"><![CDATA[A graphic displaying an ethical hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cRCmj2pB8NpGuYsXxFKLWo-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why your business needs data protection policies ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/data-protection/28177/data-protection-policies-and-procedures</link>
                                                                            <description>
                            <![CDATA[ Why your company needs them, and what they should include ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">f9tYcCKrtRq99Eyh8wPoEy</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 07 Mar 2019 16:10:00 +0000</pubDate>                                                                                                                                <updated>Sat, 03 Aug 2024 14:12:30 +0000</updated>
                                                                                                                                            <category><![CDATA[GDPR]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                    <category><![CDATA[Data Protection]]></category>
                                                                                                                    <dc:creator><![CDATA[ David Howell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Mockup image with padlocks to symbolise a cyber security vulnerability]]></media:description>                                                            <media:text><![CDATA[Mockup image with padlocks to symbolise a cyber security vulnerability]]></media:text>
                                <media:title type="plain"><![CDATA[Mockup image with padlocks to symbolise a cyber security vulnerability]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>