<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/network-security" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Network-security ]]></title>
                <link>https://www.itpro.com/tag/network-security</link>
        <description><![CDATA[ All the latest network-security content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 26 Sep 2025 10:29:11 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Cisco ASA customers urged to take immediate action as NCSC, CISA issue critical vulnerability warnings ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cisco-asa-customers-urged-to-take-immediate-action-as-ncsc-cisa-issue-critical-vulnerability-warnings</link>
                                                                            <description>
                            <![CDATA[ Cisco customers are urged to upgrade and secure systems immediately ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">X3RPSiT74dQsebZ52iKP2E</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 26 Sep 2025 10:29:11 +0000</pubDate>                                                                                                                                <updated>Fri, 26 Sep 2025 10:29:44 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:description>                                                            <media:text><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian hackers are using an old Cisco flaw to target network devices – here’s how you can stay safe ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/infrastructure/networking/russian-hackers-are-using-an-old-cisco-flaw-to-target-network-devices-heres-how-you-can-stay-safe</link>
                                                                            <description>
                            <![CDATA[ With the aim of carrying out espionage, Russia's Center 16 is targeting infrastructure organizations around the world ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BLQQRourHjGWQnodMPmdyY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/t5zGC2uXPBqGdnfQdHUCeS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 21 Aug 2025 10:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/t5zGC2uXPBqGdnfQdHUCeS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IoT cybersecurity concept image showing a digitized padlock sitting on a blue circuit board atop network traffic.]]></media:description>                                                            <media:text><![CDATA[IoT cybersecurity concept image showing a digitized padlock sitting on a blue circuit board atop network traffic.]]></media:text>
                                <media:title type="plain"><![CDATA[IoT cybersecurity concept image showing a digitized padlock sitting on a blue circuit board atop network traffic.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/t5zGC2uXPBqGdnfQdHUCeS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Edge devices are now your weakest link: VPNs, firewalls, and routers were the leading source of initial compromise in 30% of incidents last year – here’s why ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/edge-devices-are-now-your-weakest-link-vpns-firewalls-and-routers-were-the-leading-source-of-initial-compromise-in-30-percent-of-incidents-last-year-heres-why</link>
                                                                            <description>
                            <![CDATA[ Compromised network edge devices have rapidly emerged as one of the biggest attack points for small and medium businesses. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VUegmB9AzLZosktdmgsaQZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 22 Apr 2025 09:18:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Bobby Hellard) ]]></author>                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:description>                                                            <media:text><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:text>
                                <media:title type="plain"><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ HPE eyes enterprise data sovereignty gains with Aruba Networking Central expansion ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/infrastructure/networking/hpe-aruba-networking-central-updates</link>
                                                                            <description>
                            <![CDATA[ HPE has announced a sweeping expansion of its Aruba Networking Central platform, offering users a raft of new features focused on driving security and data sovereignty. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">xzBeUv99EiFABAuCwLioLN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/99q8FYxWZfyGywAkTPij5i-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 08 Apr 2025 12:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/99q8FYxWZfyGywAkTPij5i-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hewlett Packard Enterprise (HPE) corporate headquarters located in Palo Alto, California.]]></media:description>                                                            <media:text><![CDATA[Hewlett Packard Enterprise (HPE) corporate headquarters located in Palo Alto, California.]]></media:text>
                                <media:title type="plain"><![CDATA[Hewlett Packard Enterprise (HPE) corporate headquarters located in Palo Alto, California.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/99q8FYxWZfyGywAkTPij5i-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/iot-security-zero-trust-architecture</link>
                                                                            <description>
                            <![CDATA[ Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zpp4XSZpbQpqEGPdWupU84</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/t5zGC2uXPBqGdnfQdHUCeS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Feb 2025 09:00:00 +0000</pubDate>                                                                                                                                <updated>Fri, 21 Feb 2025 12:40:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/t5zGC2uXPBqGdnfQdHUCeS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IoT cybersecurity concept image showing a digitized padlock sitting on a blue circuit board atop network traffic.]]></media:description>                                                            <media:text><![CDATA[IoT cybersecurity concept image showing a digitized padlock sitting on a blue circuit board atop network traffic.]]></media:text>
                                <media:title type="plain"><![CDATA[IoT cybersecurity concept image showing a digitized padlock sitting on a blue circuit board atop network traffic.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/t5zGC2uXPBqGdnfQdHUCeS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cisco claims new smart switches provide next-level perimeter defense ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/firewalls/cisco-claims-new-smart-switches-provide-next-level-perimeter-defense</link>
                                                                            <description>
                            <![CDATA[ Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TWrS5bmsAar3pPZ3HfWmMf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yNfyTfqotSJUNhETEb4zd3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 14 Feb 2025 11:07:04 +0000</pubDate>                                                                                                                                <updated>Fri, 14 Feb 2025 14:45:43 +0000</updated>
                                                                                                                                            <category><![CDATA[Firewalls]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/yNfyTfqotSJUNhETEb4zd3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital contour concept on dark background]]></media:description>                                                            <media:text><![CDATA[Digital contour concept on dark background]]></media:text>
                                <media:title type="plain"><![CDATA[Digital contour concept on dark background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yNfyTfqotSJUNhETEb4zd3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Five Eyes cyber agencies issue guidance on edge device vulnerabilities ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/five-eyes-cyber-agencies-issue-guidance-on-edge-device-vulnerabilities</link>
                                                                            <description>
                            <![CDATA[ Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">44gupsKEJXkvZessyUyQnN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/As3sJhQBLWiw9GhuFnV3f6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Feb 2025 08:20:00 +0000</pubDate>                                                                                                                                <updated>Thu, 06 Feb 2025 14:34:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/As3sJhQBLWiw9GhuFnV3f6-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ Future technology background glowing futuristic globe HUD, digital data flowing and network structure]]></media:description>                                                            <media:text><![CDATA[ Future technology background glowing futuristic globe HUD, digital data flowing and network structure]]></media:text>
                                <media:title type="plain"><![CDATA[ Future technology background glowing futuristic globe HUD, digital data flowing and network structure]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/As3sJhQBLWiw9GhuFnV3f6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ T-Mobile security chief insists its defenses stood up to attacks linked to Salt Typhoon ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/t-mobile-security-chief-insists-its-defenses-stood-up-to-attacks-linked-to-salt-typhoon</link>
                                                                            <description>
                            <![CDATA[ No T-Mobile customers or services were affected after its security teams detected suspicious activity on their routers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aiTPnuhicTQ3MebNb5CXpD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Z97bFeonHiHPpBZpBgncG6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 28 Nov 2024 11:02:48 +0000</pubDate>                                                                                                                                <updated>Thu, 28 Nov 2024 16:37:51 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Z97bFeonHiHPpBZpBgncG6-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Night shot of the T-Mobile headquarters in Bellevue, Washington, US, lit up in pink.]]></media:description>                                                            <media:text><![CDATA[Night shot of the T-Mobile headquarters in Bellevue, Washington, US, lit up in pink.]]></media:text>
                                <media:title type="plain"><![CDATA[Night shot of the T-Mobile headquarters in Bellevue, Washington, US, lit up in pink.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Z97bFeonHiHPpBZpBgncG6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Check Point acquires Perimeter 81 in push to meet SASE demand   ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/acquisition/check-point-acquires-perimeter-81-in-push-to-meet-sase-demand</link>
                                                                            <description>
                            <![CDATA[ The half-billion dollar deal greatly expands Check Point’s service edge offering ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pzMmgdi7XgYXJPiniUWALg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qyypwQ53tpVe4zWHhQg9ne-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 10 Aug 2023 15:31:48 +0000</pubDate>                                                                                                                                <updated>Wed, 16 Aug 2023 15:14:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Acquisition]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qyypwQ53tpVe4zWHhQg9ne-1280-80.jpg">
                                                            <media:credit><![CDATA[Check Point]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Check Point logo (A stylized pink circle with a series of three nodes drawn against it in white to produce a curcular cutout effect in the top right hand corner of the circle, with a black circle to the top and right of this and the words CHECK POINT to the right of it in black text) against a white background.]]></media:description>                                                            <media:text><![CDATA[The Check Point logo (A stylized pink circle with a series of three nodes drawn against it in white to produce a curcular cutout effect in the top right hand corner of the circle, with a black circle to the top and right of this and the words CHECK POINT to the right of it in black text) against a white background.]]></media:text>
                                <media:title type="plain"><![CDATA[The Check Point logo (A stylized pink circle with a series of three nodes drawn against it in white to produce a curcular cutout effect in the top right hand corner of the circle, with a black circle to the top and right of this and the words CHECK POINT to the right of it in black text) against a white background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qyypwQ53tpVe4zWHhQg9ne-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenSSH vulnerability uncovered by researchers, RCE exploit developed  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/openssh-vulnerability-uncovered-by-researchers-rce-exploit-developed</link>
                                                                            <description>
                            <![CDATA[ Attackers can remotely manipulate common libraries to execute arbitrary code ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BcSSgyBb3FeqZGPC5zxgBH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Jul 2023 09:32:45 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Jul 2023 10:57:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[OpenSSH vulnerability: A red warning sign on a background of code, denoting malware and cyber attacks]]></media:description>                                                            <media:text><![CDATA[OpenSSH vulnerability: A red warning sign on a background of code, denoting malware and cyber attacks]]></media:text>
                                <media:title type="plain"><![CDATA[OpenSSH vulnerability: A red warning sign on a background of code, denoting malware and cyber attacks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ASUS routers receive patches for critical vulnerabilities affecting more than a dozen product lines ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/hardware/routers/asus-routers-receive-patches-for-critical-vulnerabilities-affecting-more-than-a-dozen-product-lines</link>
                                                                            <description>
                            <![CDATA[ Nearly 20 models have been affected by a spate of vulnerabilities, including two rated ‘critical’ ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">882jnuveAVpDcfuYoKDbLW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yiL5NjEQcpWpVKGHSyRUwf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 20 Jun 2023 11:39:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Routers]]></category>
                                                    <category><![CDATA[Hardware]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/yiL5NjEQcpWpVKGHSyRUwf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ASUS logo displayed at COMPUTEX 2023 in Taipei]]></media:description>                                                            <media:text><![CDATA[ASUS logo displayed at COMPUTEX 2023 in Taipei]]></media:text>
                                <media:title type="plain"><![CDATA[ASUS logo displayed at COMPUTEX 2023 in Taipei]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yiL5NjEQcpWpVKGHSyRUwf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Dragos’ new partner program aims to turn resellers into OT experts ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/dragos-new-partner-program-aims-to-turn-resellers-into-ot-experts</link>
                                                                            <description>
                            <![CDATA[ The initiative will help partners fully manage customer deployments with Dragos’ ISC/OT security offerings ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zdEUBGiYaw3RfS3q2JktJc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 14 Jun 2023 11:36:49 +0000</pubDate>                                                                                                                                <updated>Thu, 24 Apr 2025 18:08:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dragos: Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security]]></media:description>                                                            <media:text><![CDATA[Dragos: Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security]]></media:text>
                                <media:title type="plain"><![CDATA[Dragos: Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Barracuda Networks says hacked devices “must be immediately replaced” despite patches ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/barracuda-networks-says-hacked-devices-must-be-immediately-replaced-despite-patches</link>
                                                                            <description>
                            <![CDATA[ Seven-month exploitation of a critical vulnerability enabled persistent backdoor access in its email security gateway devices ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vYfzzGT59nVwtY36bAxK9S</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NBihq6k5jNtbC7WmGtAt3m-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jun 2023 10:05:44 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 09:45:38 +0000</updated>
                                                                                                                                            <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/NBihq6k5jNtbC7WmGtAt3m-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Barracuda Networks hack: Secure mail on digital screen]]></media:description>                                                            <media:text><![CDATA[Barracuda Networks hack: Secure mail on digital screen]]></media:text>
                                <media:title type="plain"><![CDATA[Barracuda Networks hack: Secure mail on digital screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NBihq6k5jNtbC7WmGtAt3m-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Warning issued over ‘widespread’ exploitation of Zyxel NAS devices ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/warning-issued-over-widespread-exploitation-of-zyxel-nas-devices</link>
                                                                            <description>
                            <![CDATA[ Zyxel has been forced to issue patches for several vulnerabilities affecting NAS devices ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VgZs93kfPZKFCbFn8PTPiR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Six3Lm5uJLhgjo6XGBqPFf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 01 Jun 2023 16:26:51 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 07:54:41 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Six3Lm5uJLhgjo6XGBqPFf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Fiber optics carrying computer virus attacking binary code]]></media:description>                                                            <media:text><![CDATA[Fiber optics carrying computer virus attacking binary code]]></media:text>
                                <media:title type="plain"><![CDATA[Fiber optics carrying computer virus attacking binary code]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Six3Lm5uJLhgjo6XGBqPFf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Barracuda network appliance vulnerability “actively exploited” for seven months ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/barracuda-network-appliance-vulnerability-actively-exploited-for-seven-months</link>
                                                                            <description>
                            <![CDATA[ The company has issued a patch, but warned customers that the vulnerability left them exposed for over half a year ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">JwiQTgXFZa9B3Bx6x3hojd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/8UD9Rbm37RcjHhKFrHRB96-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 01 Jun 2023 11:02:21 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 07:24:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/8UD9Rbm37RcjHhKFrHRB96-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital security padlock with encrypted binary code on futuristic circuit board]]></media:description>                                                            <media:text><![CDATA[Digital security padlock with encrypted binary code on futuristic circuit board]]></media:text>
                                <media:title type="plain"><![CDATA[Digital security padlock with encrypted binary code on futuristic circuit board]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/8UD9Rbm37RcjHhKFrHRB96-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ASUS, Cisco, Netgear devices exploited in ongoing Chinese hacking campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/asus-cisco-netgear-devices-exploited-in-ongoing-chinese-hacking-campaign</link>
                                                                            <description>
                            <![CDATA[ Critical national infrastructure is the target of sustained attempts from state-sponsored hackers, according to Five Eyes advisories ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4rZgNYQA8qHZazZPioTpAW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FRayTvQKar4rQVZNj8Mzrf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 25 May 2023 09:53:27 +0000</pubDate>                                                                                                                                <updated>Thu, 25 May 2023 11:31:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FRayTvQKar4rQVZNj8Mzrf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Black laptop being used by a person out of shot, denoting an anonymous hacker, against a bright backdrop of a Chinese flag]]></media:description>                                                            <media:text><![CDATA[Black laptop being used by a person out of shot, denoting an anonymous hacker, against a bright backdrop of a Chinese flag]]></media:text>
                                <media:title type="plain"><![CDATA[Black laptop being used by a person out of shot, denoting an anonymous hacker, against a bright backdrop of a Chinese flag]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FRayTvQKar4rQVZNj8Mzrf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The rise of identity-based cyber attacks and how to mitigate them ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-rise-of-identity-based-cyber-attacks-and-how-to-mitigate-them</link>
                                                                            <description>
                            <![CDATA[ If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Dmdzt3Pb6T2ghHcUFX3EiF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 09 May 2023 08:20:49 +0000</pubDate>                                                                                                                                <updated>Tue, 09 May 2023 08:46:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sandra Vogel ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks]]></media:description>                                                            <media:text><![CDATA[The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks]]></media:text>
                                <media:title type="plain"><![CDATA[The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The top malware and ransomware threats for April 2023 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/the-top-malware-and-ransomware-threats-for-april-2023</link>
                                                                            <description>
                            <![CDATA[ New ransomware gangs and malware abound as hackers continue to evolve their tactics ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">NKveEGmf2wzVUN4mjRA3v9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wxwQh5vaMoKWvRvc4tsgMe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 14 Apr 2023 11:53:32 +0000</pubDate>                                                                                                                                <updated>Mon, 17 Apr 2023 07:28:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ connor.jones@futurenet.com (Connor Jones) ]]></author>                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wxwQh5vaMoKWvRvc4tsgMe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Top malware and ransomware cause &#039;system hacked&#039; alert to appear on a computer screen]]></media:description>                                                            <media:text><![CDATA[Top malware and ransomware cause &#039;system hacked&#039; alert to appear on a computer screen]]></media:text>
                                <media:title type="plain"><![CDATA[Top malware and ransomware cause &#039;system hacked&#039; alert to appear on a computer screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wxwQh5vaMoKWvRvc4tsgMe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is the Network and Information Systems 2 (NIS2) Directive? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/policy-legislation/370403/what-is-the-network-and-information-security-2-nis2-directive</link>
                                                                            <description>
                            <![CDATA[ Everything your business needs to understand about the implications of the new EU regulations and how it differs from the UK's own updated NIS rules ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wgvrPngQXeQ3MTWkTtJgBF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MjRjdYwLLDb5TtHJ4vqa5F-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 07 Apr 2023 07:00:06 +0000</pubDate>                                                                                                                                <updated>Tue, 22 Jul 2025 14:56:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Policy and Legislation]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rene Millman) ]]></author>                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MjRjdYwLLDb5TtHJ4vqa5F-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract render of the European continent at night, with lines of glowing blue light emanating from London ]]></media:description>                                                            <media:text><![CDATA[An abstract render of the European continent at night, with lines of glowing blue light emanating from London ]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract render of the European continent at night, with lines of glowing blue light emanating from London ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MjRjdYwLLDb5TtHJ4vqa5F-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AdRem NetCrunch 13 review: Great network monitoring for time-poor SMBs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/370341/adrem-netcrunch-13-review-great-network-monitoring</link>
                                                                            <description>
                            <![CDATA[ Easily deployed and affordable network monitoring for SMBs with a range of highly informative viewpoints ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vEJemVALQHs16x8XAG4czs</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sGouP4BVEp4s8G3rR8gMvb-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Tue, 28 Mar 2023 11:00:04 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dave Mitchell ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/sGouP4BVEp4s8G3rR8gMvb-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The AdRem NetCrunch 13 user interface]]></media:description>                                                            <media:text><![CDATA[The AdRem NetCrunch 13 user interface]]></media:text>
                                <media:title type="plain"><![CDATA[The AdRem NetCrunch 13 user interface]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sGouP4BVEp4s8G3rR8gMvb-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT manager's guide to getting home in time for dinner ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/370217/the-it-managers-guide-to-getting-home-in-time-for-dinner</link>
                                                                            <description>
                            <![CDATA[ A cloud based networking solution that does away with configurations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fcxNgw12ecG9M2U3J1Ycan</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/goH3DUReMuea7tNkdVG39a-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 14:26:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Firewalls]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/goH3DUReMuea7tNkdVG39a-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Whitepaper cover with title and image of a book with a cartoon image of a man up to the eyeballs in IT Helpdesk tickets / requests]]></media:description>                                                            <media:text><![CDATA[Whitepaper cover with title and image of a book with a cartoon image of a man up to the eyeballs in IT Helpdesk tickets / requests]]></media:text>
                                <media:title type="plain"><![CDATA[Whitepaper cover with title and image of a book with a cartoon image of a man up to the eyeballs in IT Helpdesk tickets / requests]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/goH3DUReMuea7tNkdVG39a-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zero Trust myths: Fact or fiction? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/zero-day-exploit/370183/zero-trust-myths-fact-or-fiction</link>
                                                                            <description>
                            <![CDATA[ What the myths get right and wrong about Zero Trust ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hMAMMmLJ9CASmrFsMyXjT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VrzXjkVbXZ2DQ9RKwaQQhV-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 14:20:10 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[VPN]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/VrzXjkVbXZ2DQ9RKwaQQhV-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Webinar screen with title and contributor images]]></media:description>                                                            <media:text><![CDATA[Webinar screen with title and contributor images]]></media:text>
                                <media:title type="plain"><![CDATA[Webinar screen with title and contributor images]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VrzXjkVbXZ2DQ9RKwaQQhV-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Achieving zero trust for corporate networks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/370182/achieving-zero-trust-for-corporate-networks</link>
                                                                            <description>
                            <![CDATA[ Zero trust is a new way of thinking about information security ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cgBDgEoXcw4Bir2rV8uUPs</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GB7YYAdRm3LRnVVscE6aUg-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 13:00:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/GB7YYAdRm3LRnVVscE6aUg-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Webinar title screen with images of contributors]]></media:description>                                                            <media:text><![CDATA[Webinar title screen with images of contributors]]></media:text>
                                <media:title type="plain"><![CDATA[Webinar title screen with images of contributors]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GB7YYAdRm3LRnVVscE6aUg-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Organisations seek SSE solutions to help ease pain of remote work ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/370181/organisations-seek-sse-solutions-to-help-ease-pain-of-remote-work</link>
                                                                            <description>
                            <![CDATA[ How ZTNA wins the network security game ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">peauAWBGFYgiKPBwrQwSNN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PzPYrQG3haFGEtLbFLjsDN-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 12:57:21 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/PzPYrQG3haFGEtLbFLjsDN-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Blue whitepaper cover with title over a digital image of a book on top of a white surface with stars in the background ]]></media:description>                                                            <media:text><![CDATA[Blue whitepaper cover with title over a digital image of a book on top of a white surface with stars in the background ]]></media:text>
                                <media:title type="plain"><![CDATA[Blue whitepaper cover with title over a digital image of a book on top of a white surface with stars in the background ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PzPYrQG3haFGEtLbFLjsDN-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ZTNA vs on-premises VPN ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/mobile/remote-access/370180/ztna-vs-on-premises-vpn</link>
                                                                            <description>
                            <![CDATA[ How ZTNA wins the network security game ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hjhUqyWjcDkSocDS3UeSbN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NeckmEo98JWfdotfzrjgbk-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 12:52:38 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[VPN]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/NeckmEo98JWfdotfzrjgbk-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Whitepaper cover with digital images of two books, one open and one with digital image of a cloud and person icon in the centre, with square graphics of a network, shield, and verified icons]]></media:description>                                                            <media:text><![CDATA[Whitepaper cover with digital images of two books, one open and one with digital image of a cloud and person icon in the centre, with square graphics of a network, shield, and verified icons]]></media:text>
                                <media:title type="plain"><![CDATA[Whitepaper cover with digital images of two books, one open and one with digital image of a cloud and person icon in the centre, with square graphics of a network, shield, and verified icons]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NeckmEo98JWfdotfzrjgbk-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The WFH cyber security checklist ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/mobile/remote-access/370179/the-wfh-cyber-security-checklist</link>
                                                                            <description>
                            <![CDATA[ Ten ways to win the remote access game with ZTNA ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">h2rHrEMqELJE8dPmCx58uX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/HZj96Z5myU4QbgD5zye974-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 12:43:55 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/HZj96Z5myU4QbgD5zye974-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dark whitepaper cover with title and image of two books, one open and one with the author on the front cover]]></media:description>                                                            <media:text><![CDATA[Dark whitepaper cover with title and image of two books, one open and one with the author on the front cover]]></media:text>
                                <media:title type="plain"><![CDATA[Dark whitepaper cover with title and image of two books, one open and one with the author on the front cover]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/HZj96Z5myU4QbgD5zye974-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The essential guide to preventing ransomware attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/370178/the-essential-guide-to-preventing-ransomware-attacks</link>
                                                                            <description>
                            <![CDATA[ Vital tips and guidelines to protect your business using ZTNA and SSE ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qvtudpyJAXot2dyLgNGhrG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4eRfmiXyLuCUJqizfhK2R7-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 12:25:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/4eRfmiXyLuCUJqizfhK2R7-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Blue whitepaper cover with title and word ransomware made up of newspaper cut out letters]]></media:description>                                                            <media:text><![CDATA[Blue whitepaper cover with title and word ransomware made up of newspaper cut out letters]]></media:text>
                                <media:title type="plain"><![CDATA[Blue whitepaper cover with title and word ransomware made up of newspaper cut out letters]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4eRfmiXyLuCUJqizfhK2R7-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Network security musts: The seven point checklist ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/infrastructure/network-internet/370177/network-security-musts-the-seven-point-checklist</link>
                                                                            <description>
                            <![CDATA[ How to acquire and deploy your cloud-based network security solution ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">g8k3aQh7jsyF55ggJ3Rmq9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/K6PsDHYCFzosCEuQe7Pmd6-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Mar 2023 12:23:50 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/K6PsDHYCFzosCEuQe7Pmd6-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Whitepaper cover with title and digital image of a scroll of paper with tick list on it, with square graphics containing flame, shield, and verified icons]]></media:description>                                                            <media:text><![CDATA[Whitepaper cover with title and digital image of a scroll of paper with tick list on it, with square graphics containing flame, shield, and verified icons]]></media:text>
                                <media:title type="plain"><![CDATA[Whitepaper cover with title and digital image of a scroll of paper with tick list on it, with square graphics containing flame, shield, and verified icons]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/K6PsDHYCFzosCEuQe7Pmd6-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft 365 security checklist ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/370245/microsoft-365-security-checklist</link>
                                                                            <description>
                            <![CDATA[ A practical guide for the time-strapped admin ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">7pn4n5yg7Rd6H5rVxKdMdf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Ug5GyVmcJNwy4JdDwUHAXD-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Mon, 13 Mar 2023 14:59:27 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/Ug5GyVmcJNwy4JdDwUHAXD-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dark whitepaper cover with digital image of laptops around a central network block with blue light beam shining down on the block]]></media:description>                                                            <media:text><![CDATA[Dark whitepaper cover with digital image of laptops around a central network block with blue light beam shining down on the block]]></media:text>
                                <media:title type="plain"><![CDATA[Dark whitepaper cover with digital image of laptops around a central network block with blue light beam shining down on the block]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Ug5GyVmcJNwy4JdDwUHAXD-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The global use of collaboration solutions in hybrid working environments ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-security/370219/the-global-use-of-collaboration-solutions-in-hybrid-working</link>
                                                                            <description>
                            <![CDATA[ How companies manage security risks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">q5qjCeS1pJHXN5YAWJtpYY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VNCs6oMsMgazrtCTAPp6EK-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Mar 2023 08:13:35 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/VNCs6oMsMgazrtCTAPp6EK-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Black whitepaper cover with title and logos and bottom-right image of a mobile phone screen with pink, green and black messages popping up from the screen]]></media:description>                                                            <media:text><![CDATA[Black whitepaper cover with title and logos and bottom-right image of a mobile phone screen with pink, green and black messages popping up from the screen]]></media:text>
                                <media:title type="plain"><![CDATA[Black whitepaper cover with title and logos and bottom-right image of a mobile phone screen with pink, green and black messages popping up from the screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VNCs6oMsMgazrtCTAPp6EK-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ HPE accelerates network security drive with Axis Security acquisition ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business-strategy/mergers-and-acquisitions/370187/hpe-network-security-drive-axis-security-acquisition</link>
                                                                            <description>
                            <![CDATA[ The acquisition builds on the recent purchase of Italian private cellular technology provider, Athonet ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rfUpGYisywXLc9YKFTLWRn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xe72f2xWKLZuwHiDvXAK34-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Mar 2023 12:14:57 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Acquisition]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xe72f2xWKLZuwHiDvXAK34-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A view of a building with an HPE logo displayed on the outside]]></media:description>                                                            <media:text><![CDATA[A view of a building with an HPE logo displayed on the outside]]></media:text>
                                <media:title type="plain"><![CDATA[A view of a building with an HPE logo displayed on the outside]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xe72f2xWKLZuwHiDvXAK34-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ SolarWinds Network Performance Monitor 2022.4 review: Quirky licensing and a remarkable range of troubleshooting tools ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/370102/solarwinds-network-performance-monitor-20224-review</link>
                                                                            <description>
                            <![CDATA[ Lots of optional extras to consider, but NPM delivers a big monitoring toolbox in a smart web console ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jj9V9uE6bR77w7dWNCbCWk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/K7o8QuCLZYQDJwN3cSh2AD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Feb 2023 12:00:08 +0000</pubDate>                                                                                                                                <updated>Fri, 23 Jun 2023 08:50:12 +0000</updated>
                                                                                                                                            <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dave Mitchell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/K7o8QuCLZYQDJwN3cSh2AD-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The SolarWinds NPM console ]]></media:description>                                                            <media:text><![CDATA[The SolarWinds NPM console ]]></media:text>
                                <media:title type="plain"><![CDATA[The SolarWinds NPM console ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/K7o8QuCLZYQDJwN3cSh2AD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Paessler PRTG Network Monitor 22.4 review: Extremely versatile network monitoring ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/370057/paessler-prtg-network-monitor-224-review-extremely-versatile</link>
                                                                            <description>
                            <![CDATA[ With all sensors included in the price, PRTG is a great choice for SMBs that want the big network picture ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2RbhkTVdFbDa251agCeUy5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tCKndqzr9pApDbykuMYMyM-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Feb 2023 12:00:05 +0000</pubDate>                                                                                                                                <updated>Wed, 08 Nov 2023 15:35:45 +0000</updated>
                                                                                                                                            <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dave Mitchell ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/tCKndqzr9pApDbykuMYMyM-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Paessler prtg network monitor user interface ]]></media:description>                                                            <media:text><![CDATA[The Paessler prtg network monitor user interface ]]></media:text>
                                <media:title type="plain"><![CDATA[The Paessler prtg network monitor user interface ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tCKndqzr9pApDbykuMYMyM-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT Pro Podcast: How secure is metaverse tech? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/369545/the-it-pro-podcast-how-secure-is-metaverse-tech</link>
                                                                            <description>
                            <![CDATA[ If we're not careful, the risks of this new frontier could outweigh the rewards ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hiH2QHFVmKCi5G9beQYTZw</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/XUeGWhY7e8yR6tXnpQo2V-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 18 Nov 2022 18:35:21 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/XUeGWhY7e8yR6tXnpQo2V-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;How secure is metaverse tech?&amp;#039;]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;How secure is metaverse tech?&amp;#039;]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;How secure is metaverse tech?&amp;#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/XUeGWhY7e8yR6tXnpQo2V-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Podcast transcript: How secure is metaverse tech? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/369544/podcast-transcript-how-secure-is-metaverse-tech</link>
                                                                            <description>
                            <![CDATA[ Read the full transcript for this episode of the IT Pro Podcast ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mzq5HmLipZZjt4E3zeQ67Z</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wq7yNVyNy9FZJZnBm4HkfK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 18 Nov 2022 18:35:18 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wq7yNVyNy9FZJZnBm4HkfK-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;How secure is metaverse tech?&amp;#039;&amp;#039;]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;How secure is metaverse tech?&amp;#039;&amp;#039;]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;How secure is metaverse tech?&amp;#039;&amp;#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wq7yNVyNy9FZJZnBm4HkfK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ VMware brings XDR capabilities to Carbon Black in a push for lateral security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/369481/vmware-brings-xdr-to-carbon-black-push-lateral-security</link>
                                                                            <description>
                            <![CDATA[ The cloud giant aims to provide customers with the means to identify and rectify weaknesses across their environments ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rsMKVviJDC1TsnZX9PN5xa</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LYWHzTvaR4fdwvepRyb9ig-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 09 Nov 2022 14:03:22 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LYWHzTvaR4fdwvepRyb9ig-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A telephoto shot of the VMware logo on the conference floor of VMware Explore Europe]]></media:description>                                                            <media:text><![CDATA[A telephoto shot of the VMware logo on the conference floor of VMware Explore Europe]]></media:text>
                                <media:title type="plain"><![CDATA[A telephoto shot of the VMware logo on the conference floor of VMware Explore Europe]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LYWHzTvaR4fdwvepRyb9ig-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Information security vs cyber security vs network security: What are the differences? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/369418/information-security-vs-cyber-security-vs-network-security</link>
                                                                            <description>
                            <![CDATA[ A guide to the essential differences between information, network, and cyber security and the basic tenets of each ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2HJ4vtZNCMJCkfwqC9rbCb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2zGpqpHzZBsLbJfej9Lx9P-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 28 Oct 2022 10:06:41 +0000</pubDate>                                                                                                                                <updated>Fri, 17 May 2024 15:19:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Careers and Training]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2zGpqpHzZBsLbJfej9Lx9P-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Three lines of wooden hexagonal blocks that diverge into three discrete lines, on a bright blue background]]></media:description>                                                            <media:text><![CDATA[Three lines of wooden hexagonal blocks that diverge into three discrete lines, on a bright blue background]]></media:text>
                                <media:title type="plain"><![CDATA[Three lines of wooden hexagonal blocks that diverge into three discrete lines, on a bright blue background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2zGpqpHzZBsLbJfej9Lx9P-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Building a better password strategy for your business ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/369393/building-a-better-password-strategy-for-your-business</link>
                                                                            <description>
                            <![CDATA[ Exploring the strategies and exploits that hackers are using to circumvent password security measures ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3piE71qspDFm4nqadnEK9R</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sr7PL6RyX4xfWCPshjfCie-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 26 Oct 2022 08:39:37 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/sr7PL6RyX4xfWCPshjfCie-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Whitepaper cover with title in block red box and image of keyboard keys, with a padlock and finger print]]></media:description>                                                            <media:text><![CDATA[Whitepaper cover with title in block red box and image of keyboard keys, with a padlock and finger print]]></media:text>
                                <media:title type="plain"><![CDATA[Whitepaper cover with title in block red box and image of keyboard keys, with a padlock and finger print]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sr7PL6RyX4xfWCPshjfCie-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ WatchGuard finds malware volume decreased in Q2, but warns Emotet is resurging ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/369191/watchguard-finds-that-malware-volume-decreased-in-q2-but-warns-emotet-is-resurging</link>
                                                                            <description>
                            <![CDATA[ The network security company underlined that Microsoft Office exploits continue to spread more than any other category of malware too ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">e23Grksr2DE1iFbyiSrre6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2QVtGsQqwJmbv96BVLpaAJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 28 Sep 2022 10:31:39 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2QVtGsQqwJmbv96BVLpaAJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Image of a cyber criminal using several computers in a dark room ]]></media:description>                                                            <media:text><![CDATA[Image of a cyber criminal using several computers in a dark room ]]></media:text>
                                <media:title type="plain"><![CDATA[Image of a cyber criminal using several computers in a dark room ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2QVtGsQqwJmbv96BVLpaAJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DrayTek Vigor 2866ax review: Faster than you might expect ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/hardware/routers/369016/draytek-vigor-2866ax-review-faster-than-you-might-expect</link>
                                                                            <description>
                            <![CDATA[ A versatile and very affordable SMB security router with Wi-Fi 6 and top-notch WAN redundancy ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sFPRnXb1WDP4cuzZes8bkQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rDbJhLq6vEs7FzNVkV833i-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 07 Sep 2022 16:46:33 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Routers]]></category>
                                                    <category><![CDATA[Hardware]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dave Mitchell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rDbJhLq6vEs7FzNVkV833i-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A photograph of the DrayTek Vigor 2866ax]]></media:description>                                                            <media:text><![CDATA[A photograph of the DrayTek Vigor 2866ax]]></media:text>
                                <media:title type="plain"><![CDATA[A photograph of the DrayTek Vigor 2866ax]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rDbJhLq6vEs7FzNVkV833i-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Gov to force through tough telecoms regulations to boost network security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/368914/gov-to-force-through-tough-telecoms-regulations-to-boost-network</link>
                                                                            <description>
                            <![CDATA[ Regulator Ofcom will have powers to monitor, investigate and fine providers that fail to meet the new requirements ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4Qz2DgopD5aMdvMs4g4oN7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Bpf4MWYynHCtAjgSu6p9tj-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 30 Aug 2022 15:03:23 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Policy and Legislation]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Bpf4MWYynHCtAjgSu6p9tj-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[Shutterstock]]></media:description>                                                            <media:text><![CDATA[Photo of London mocked up to show internet traffic flowing in and out of it]]></media:text>
                                <media:title type="plain"><![CDATA[Photo of London mocked up to show internet traffic flowing in and out of it]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Bpf4MWYynHCtAjgSu6p9tj-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NEC and Fortinet partner to deliver high-performance security for 5G networks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/mobile/5g/368870/nec-and-fortinet-partner-to-deliver-high-performance-security-5g-networks</link>
                                                                            <description>
                            <![CDATA[ The carrier solution will ensure end-to-end security while CSPs contend with increased traffic ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9Hr1UaWvXFV9XRp4rsfDFc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JkCseP5KDC5VwZBtnfqkLS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 23 Aug 2022 14:34:46 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[5g]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                    <category><![CDATA[Mobile Networks]]></category>
                                                                                                                    <dc:creator><![CDATA[ Praharsha Anand ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JkCseP5KDC5VwZBtnfqkLS-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Fortinet sign on a grey building]]></media:description>                                                            <media:text><![CDATA[Fortinet sign on a grey building]]></media:text>
                                <media:title type="plain"><![CDATA[Fortinet sign on a grey building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JkCseP5KDC5VwZBtnfqkLS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Over 200,000 DrayTek routers vulnerable to total device takeover ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/368725/over-200000-draytek-routers-vulnerable-to-total-device-takeover</link>
                                                                            <description>
                            <![CDATA[ The routers are popular with small and medium businesses, but are easily exploitable by threat actors seeking to steal data or launch ransomware ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">v7jZNoubzL3RnR53DCTV6k</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oX9XyayN63jXpqGSoj5zdB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 03 Aug 2022 12:24:05 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oX9XyayN63jXpqGSoj5zdB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A digital render of a blue padlock fragmenting into a cloud of data]]></media:description>                                                            <media:text><![CDATA[A digital render of a blue padlock fragmenting into a cloud of data]]></media:text>
                                <media:title type="plain"><![CDATA[A digital render of a blue padlock fragmenting into a cloud of data]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oX9XyayN63jXpqGSoj5zdB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cloudflare unveils new One Partner Program with zero trust at its core ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/channel/368357/cloudflare-unveils-new-one-partner-program-with-zero-trust-at-its-core</link>
                                                                            <description>
                            <![CDATA[ Cloudflare CEO Matthew Prince says the initiative aims to take the complexity out of zero trust architecture ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fWuhosCGAxctrWPP6AU1T7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZBmCFzk8RtkLCDfncgD8xm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Jun 2022 10:16:37 +0000</pubDate>                                                                                                                                <updated>Thu, 24 Apr 2025 18:16:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZBmCFzk8RtkLCDfncgD8xm-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[Cloudflare CEO and co-founder Matthew Prince]]></media:description>                                                            <media:text><![CDATA[A close up photo of Matthew Prince, CEO and co-founder of Cloudflare, speaking on a stage]]></media:text>
                                <media:title type="plain"><![CDATA[A close up photo of Matthew Prince, CEO and co-founder of Cloudflare, speaking on a stage]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZBmCFzk8RtkLCDfncgD8xm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Network detection and response market to hit $5.3bn by 2028 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/network-security/368169/network-detection-and-response-market-to-hit-53bn-by-2028</link>
                                                                            <description>
                            <![CDATA[ North America is estimated to hold the largest market share over the forecast period ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cq8cfZcbNtvVs9zqM52G27</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MvfBmVw9XrmMsnEbcPt4FE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Jun 2022 12:40:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Praharsha Anand ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MvfBmVw9XrmMsnEbcPt4FE-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Finger pointing towards malware on a piece of code]]></media:description>                                                            <media:text><![CDATA[Finger pointing towards malware on a piece of code]]></media:text>
                                <media:title type="plain"><![CDATA[Finger pointing towards malware on a piece of code]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MvfBmVw9XrmMsnEbcPt4FE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/367644/five-eyes-leaders-issue-guidance-for-msps-to-prevent-second-solarwinds-attack</link>
                                                                            <description>
                            <![CDATA[ The joint advisory published today said MSPs and customers need more vigilant in the wake of Russia's invasion of Ukraine ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4yPmZbL8J7fDhbv2ZKodY8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DNvGL2Jd4dGCQ4aarB4ZLW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 May 2022 12:26:36 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DNvGL2Jd4dGCQ4aarB4ZLW-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A group of hackers behind the Russian flag]]></media:description>                                                            <media:text><![CDATA[A group of hackers behind the Russian flag]]></media:text>
                                <media:title type="plain"><![CDATA[A group of hackers behind the Russian flag]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DNvGL2Jd4dGCQ4aarB4ZLW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Vector Capital acquires majority ownership of WatchGuard ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/367541/vector-capital-acquires-majority-ownership-of-watchguard</link>
                                                                            <description>
                            <![CDATA[ Global private equity firm gobbles up shares from co-investors as it doubles down on its commitment to the cyber security platform provider ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aK75x329HE4YHtbeo9N1u9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NAEo9aFrDcWStQQY4fKaCC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 29 Apr 2022 09:46:29 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Acquisition]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/NAEo9aFrDcWStQQY4fKaCC-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A neon blue digital padlock against a black background]]></media:description>                                                            <media:text><![CDATA[A neon blue digital padlock against a black background]]></media:text>
                                <media:title type="plain"><![CDATA[A neon blue digital padlock against a black background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NAEo9aFrDcWStQQY4fKaCC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Auvik Network Management review: A breeze to deploy ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/infrastructure/network-internet/367287/auvik-network-management-review-a-breeze-to-deploy</link>
                                                                            <description>
                            <![CDATA[ Auvik’s cloud-hosted monitoring is quick to provide a complete picture of your network ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eUgpDpuUzU4f64iQuN8x9b</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Hp5Kggeo6wkJqHwD85gJGX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 Apr 2022 12:27:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dave Mitchell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Hp5Kggeo6wkJqHwD85gJGX-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Auvik Network Management screenshot]]></media:description>                                                            <media:text><![CDATA[Auvik Network Management screenshot]]></media:text>
                                <media:title type="plain"><![CDATA[Auvik Network Management screenshot]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Hp5Kggeo6wkJqHwD85gJGX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ New MFA security standards for online payments come into force ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/two-factor-authentication-2fa/367276/mfa-security-standards-updated-for-online-payments</link>
                                                                            <description>
                            <![CDATA[ Version 4.0 of PCI DSS also reforms password requirements and broadens its terminology to address other network access controls ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sXSf1xGxn4dA13ejE1qAo9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/coGqn2jbqaBrZw8kc6U5Mo-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 31 Mar 2022 17:08:52 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Networking]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                                                                                    <dc:creator><![CDATA[ Danny Bradbury ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/coGqn2jbqaBrZw8kc6U5Mo-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Man holding credit card making online payment on a tablet]]></media:description>                                                            <media:text><![CDATA[Man holding credit card making online payment on a tablet]]></media:text>
                                <media:title type="plain"><![CDATA[Man holding credit card making online payment on a tablet]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/coGqn2jbqaBrZw8kc6U5Mo-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Vodafone and Ericsson complete UK's first 5G network slicing trial ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/mobile/5g/366979/vodafone-ericsson-complete-first-5g-network-slicing-trial</link>
                                                                            <description>
                            <![CDATA[ Network slicing allows businesses and app developers to carve out a ‘slice’ of the network suited to specific use cases ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">atMri9dP2CRxc7rQTsU73</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/CgjR23HvspGZRnoTfGBnsG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 15 Mar 2022 10:52:23 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[5g]]></category>
                                                    <category><![CDATA[Infrastructure]]></category>
                                                    <category><![CDATA[Mobile Networks]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/CgjR23HvspGZRnoTfGBnsG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Top view of people walking in different directions of pattern, painted on asphalt as visual representation of network slicing]]></media:description>                                                            <media:text><![CDATA[Top view of people walking in different directions of pattern, painted on asphalt as visual representation of network slicing]]></media:text>
                                <media:title type="plain"><![CDATA[Top view of people walking in different directions of pattern, painted on asphalt as visual representation of network slicing]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/CgjR23HvspGZRnoTfGBnsG-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>