<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/uk/feeds/tag/enterprise-security" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro UK in Enterprise-security ]]></title>
                <link>https://www.itpro.com/tag/enterprise-security</link>
        <description><![CDATA[ All the latest enterprise-security content from the ITPro  UK team ]]></description>
                                    <lastBuildDate>Wed, 09 Jul 2025 11:25:00 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ ‘The worst thing an employee could do’: Workers are covering up cyber attacks for fear of reprisal – here’s why that’s a huge problem ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-worst-thing-an-employee-could-do-workers-are-covering-up-cyber-attacks-for-fear-of-reprisal-heres-why-thats-a-huge-problem</link>
                                                                            <description>
                            <![CDATA[ More than one-third of office workers say they wouldn’t tell their cybersecurity team if they thought they had been the victim of a cyber attack. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XfWBssdeBNQVQm6ujgeevG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/8eHSiVD9ymBMhfQqJ3VxPg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 09 Jul 2025 11:25:00 +0000</pubDate>                                                                                                                                <updated>Wed, 09 Jul 2025 11:28:51 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/8eHSiVD9ymBMhfQqJ3VxPg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Female office worker in an open plan workspace looking concerned while working on laptop.]]></media:description>                                                            <media:text><![CDATA[Female office worker in an open plan workspace looking concerned while working on laptop.]]></media:text>
                                <media:title type="plain"><![CDATA[Female office worker in an open plan workspace looking concerned while working on laptop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/8eHSiVD9ymBMhfQqJ3VxPg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Shifting left might improve software security, but developers are becoming overwhelmed – communication barriers, tool sprawl, and ‘vulnerability overload’ are causing serious headaches for development teams ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/development/software-security-shift-left-developer-overload</link>
                                                                            <description>
                            <![CDATA[ Developers are becoming overwhelmed amid the 'shift left' in development practices, new research shows. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EUT7wUMzfHPvc2bN2ePQqR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7YH4hNrEoL7oEoygVyJuZi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 29 May 2025 11:50:45 +0000</pubDate>                                                                                                                                <updated>Thu, 29 May 2025 14:38:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Development]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7YH4hNrEoL7oEoygVyJuZi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Software security concept image showing female developer working on a desktop computer with screen reflected in glasses.]]></media:description>                                                            <media:text><![CDATA[Software security concept image showing female developer working on a desktop computer with screen reflected in glasses.]]></media:text>
                                <media:title type="plain"><![CDATA[Software security concept image showing female developer working on a desktop computer with screen reflected in glasses.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7YH4hNrEoL7oEoygVyJuZi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ "Thinly spread": Questions raised over UK government’s latest cyber funding scheme ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/thinly-spread-questions-raised-over-uk-governments-latest-cyber-funding-scheme</link>
                                                                            <description>
                            <![CDATA[ The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sFJaLxh7kPdjUAGtcGH4HB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RytBMt57BpcZ3EQpS9yi4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Jan 2025 11:50:28 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Jan 2025 13:53:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ george.fitzmaurice@futurenet.com (George Fitzmaurice) ]]></author>                    <dc:creator><![CDATA[ George Fitzmaurice ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RytBMt57BpcZ3EQpS9yi4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[View of the Houses of Parliament, London, UK.]]></media:description>                                                            <media:text><![CDATA[View of the Houses of Parliament, London, UK.]]></media:text>
                                <media:title type="plain"><![CDATA[View of the Houses of Parliament, London, UK.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RytBMt57BpcZ3EQpS9yi4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Acronis Cyber Protect Cloud review: Slick automated threat remediation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/acronis-cyber-protect-cloud-review-slick-automated-threat-remediation</link>
                                                                            <description>
                            <![CDATA[ A single cloud service that neatly combines malware protection with backup and recovery features ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">29G93GZ2JExyDaV2SCKcob</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/EFdGmUBvkrVStGbbSB5xUX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 08 Dec 2023 08:35:55 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dave Mitchell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/EFdGmUBvkrVStGbbSB5xUX-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Acronis Cyber Protect Cloud user interface]]></media:description>                                                            <media:text><![CDATA[The Acronis Cyber Protect Cloud user interface]]></media:text>
                                <media:title type="plain"><![CDATA[The Acronis Cyber Protect Cloud user interface]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/EFdGmUBvkrVStGbbSB5xUX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ GDPR fines just 6% of the total cost of data breaches ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/gdpr-fines-just-6-of-the-total-cost-of-data-breaches</link>
                                                                            <description>
                            <![CDATA[ Costs are surging as tickbox compliance distracts organizations from proper security ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TtC5ZycGxPejJUswNyKpb9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 08 Aug 2023 11:44:36 +0000</pubDate>                                                                                                                                <updated>Wed, 16 Aug 2023 11:06:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A red warning sign on a backgroud of code, denoting malware and cyber attacks]]></media:description>                                                            <media:text><![CDATA[A red warning sign on a backgroud of code, denoting malware and cyber attacks]]></media:text>
                                <media:title type="plain"><![CDATA[A red warning sign on a backgroud of code, denoting malware and cyber attacks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Software security ‘overhauled for the better’ thanks to US legislation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/software-security-overhauled-for-the-better-thanks-to-us-legislation</link>
                                                                            <description>
                            <![CDATA[ The requirements around necessitating a software bill of materials have driven positive changes in both the US and UK ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">v8ednnfaoG44NPGBKrrLSn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VUDZptndWJDCBjYxYfV9u6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 03 Aug 2023 13:00:00 +0000</pubDate>                                                                                                                                <updated>Fri, 04 Aug 2023 10:34:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VUDZptndWJDCBjYxYfV9u6-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Software security depicted by an image of sprawling Python code displayed on a screen]]></media:description>                                                            <media:text><![CDATA[Software security depicted by an image of sprawling Python code displayed on a screen]]></media:text>
                                <media:title type="plain"><![CDATA[Software security depicted by an image of sprawling Python code displayed on a screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VUDZptndWJDCBjYxYfV9u6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ubuntu shifts to four-week update cycle ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/linux/ubuntu-shifts-to-four-week-update-cycle</link>
                                                                            <description>
                            <![CDATA[ Critical fixes will also come every two weeks, mitigating the issues involved with releasing prompt patches on the old three-week cadence ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">c4YQiYGN3vKZbvNdthoKtL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MerZpQ6vR99uzygjyKfjK8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 02 Aug 2023 14:58:46 +0000</pubDate>                                                                                                                                <updated>Thu, 03 Aug 2023 12:46:57 +0000</updated>
                                                                                                                                            <category><![CDATA[Linux]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MerZpQ6vR99uzygjyKfjK8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red Ubuntu logo appearing on a web browser with a microscope over the logo, placing emphasis on it]]></media:description>                                                            <media:text><![CDATA[Red Ubuntu logo appearing on a web browser with a microscope over the logo, placing emphasis on it]]></media:text>
                                <media:title type="plain"><![CDATA[Red Ubuntu logo appearing on a web browser with a microscope over the logo, placing emphasis on it]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MerZpQ6vR99uzygjyKfjK8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber attacks in the cloud take less than ten minutes to launch ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/cyber-attacks-in-the-cloud-take-less-than-ten-minutes-to-launch</link>
                                                                            <description>
                            <![CDATA[ Researchers said the time it takes to attack the cloud is “light years” quicker than traditional scenarios ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gycx5pTAutXWgMkeGxpzBN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Sb34qzHnFamveDnex64kMY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 02 Aug 2023 14:41:26 +0000</pubDate>                                                                                                                                <updated>Thu, 03 Aug 2023 12:42:51 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Sb34qzHnFamveDnex64kMY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber attack: Cloud made of little cubes]]></media:description>                                                            <media:text><![CDATA[Cyber attack: Cloud made of little cubes]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber attack: Cloud made of little cubes]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Sb34qzHnFamveDnex64kMY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Report: Google Cloud Platform is the most commonly misconfigured big-three cloud platform ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/report-google-cloud-platform-is-the-most-commonly-misconfigured-big-three-cloud-platform</link>
                                                                            <description>
                            <![CDATA[ Little separated GCP and Azure, but AWS fared markedly better according to the latest figures ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">K7nfUKoA59FteJfxbi5tCX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/eGBuw7HPn9vDjv5Gf2jZwg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 01 Aug 2023 13:00:00 +0000</pubDate>                                                                                                                                <updated>Wed, 02 Aug 2023 13:15:20 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/eGBuw7HPn9vDjv5Gf2jZwg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Google Cloud Platform logo displayed on their stand during the Mobile World Congress 2023]]></media:description>                                                            <media:text><![CDATA[The Google Cloud Platform logo displayed on their stand during the Mobile World Congress 2023]]></media:text>
                                <media:title type="plain"><![CDATA[The Google Cloud Platform logo displayed on their stand during the Mobile World Congress 2023]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/eGBuw7HPn9vDjv5Gf2jZwg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Thoma Bravo adds $1.5bn in value to Imperva before selling to Thales ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/acquisition/thoma-bravo-adds-dollar15bn-in-value-to-imperva-as-thales-acquisition-agreed</link>
                                                                            <description>
                            <![CDATA[ Software investment giant to sell off the US-based data and application security provider for $3.6 billion ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">YtMvrHjnys6FYmmqABYrga</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sX8yaf5ehG9kLmi8VbSu6V-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 26 Jul 2023 10:32:27 +0000</pubDate>                                                                                                                                <updated>Fri, 28 Jul 2023 15:28:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Acquisition]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sX8yaf5ehG9kLmi8VbSu6V-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Thoma Bravo sells Imperva to Thales: Imperva&#039;s logo on a smartphone]]></media:description>                                                            <media:text><![CDATA[Thoma Bravo sells Imperva to Thales: Imperva&#039;s logo on a smartphone]]></media:text>
                                <media:title type="plain"><![CDATA[Thoma Bravo sells Imperva to Thales: Imperva&#039;s logo on a smartphone]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sX8yaf5ehG9kLmi8VbSu6V-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cryptojacking attacks surge 399% globally as threat actors diversify tactics ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cryptojacking-attacks-surge-399-globally-as-threat-actors-diversify-tactics</link>
                                                                            <description>
                            <![CDATA[ Attackers are switching tactics to wreak havoc and maximize financial gains ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2f4fweCgsNPfXAzhvPXx5o</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MZTBPVYpCXchNj6t4aFJ4T-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 26 Jul 2023 10:01:39 +0000</pubDate>                                                                                                                                <updated>Mon, 31 Jul 2023 12:02:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MZTBPVYpCXchNj6t4aFJ4T-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cryptojacking: A neon purple, fragmenting cryptocurrency token is hovering above the ground in a futuristic looking room]]></media:description>                                                            <media:text><![CDATA[Cryptojacking: A neon purple, fragmenting cryptocurrency token is hovering above the ground in a futuristic looking room]]></media:text>
                                <media:title type="plain"><![CDATA[Cryptojacking: A neon purple, fragmenting cryptocurrency token is hovering above the ground in a futuristic looking room]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MZTBPVYpCXchNj6t4aFJ4T-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NTT Data begins rolling out new MDR service  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ntt-data-begins-rolling-out-new-mdr-service</link>
                                                                            <description>
                            <![CDATA[ The new security management outsourcing offering is being launched in Japan before a wider global release before March 2024 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Q4cmzYXn936u94SdJoPfBH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JfDCLjBNLnmpCQrY5MT2U4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Jul 2023 10:09:21 +0000</pubDate>                                                                                                                                <updated>Mon, 31 Jul 2023 11:29:26 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JfDCLjBNLnmpCQrY5MT2U4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NTT Data logo displayed on a glass door in an office]]></media:description>                                                            <media:text><![CDATA[NTT Data logo displayed on a glass door in an office]]></media:text>
                                <media:title type="plain"><![CDATA[NTT Data logo displayed on a glass door in an office]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JfDCLjBNLnmpCQrY5MT2U4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ IBM: Law enforcement helped save ransomware victims $470k in 2023 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ibm-law-enforcement-helped-save-ransomware-victims-dollar470k-in-2023</link>
                                                                            <description>
                            <![CDATA[ New report reveals that organizations that reached out to law enforcement saw shorter recovery times and lower financial impact ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tTpdHALpsQtA3bFdDTaGgU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3mUMFwCvQx59DXbzPVdfRK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 24 Jul 2023 04:01:00 +0000</pubDate>                                                                                                                                <updated>Mon, 31 Jul 2023 11:26:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3mUMFwCvQx59DXbzPVdfRK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IBM: Mockup image of ransomware - a red background with binary code and a padlock in the middle with &#039;ransomware&#039; written on top of it]]></media:description>                                                            <media:text><![CDATA[IBM: Mockup image of ransomware - a red background with binary code and a padlock in the middle with &#039;ransomware&#039; written on top of it]]></media:text>
                                <media:title type="plain"><![CDATA[IBM: Mockup image of ransomware - a red background with binary code and a padlock in the middle with &#039;ransomware&#039; written on top of it]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3mUMFwCvQx59DXbzPVdfRK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenSSH vulnerability uncovered by researchers, RCE exploit developed  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/openssh-vulnerability-uncovered-by-researchers-rce-exploit-developed</link>
                                                                            <description>
                            <![CDATA[ Attackers can remotely manipulate common libraries to execute arbitrary code ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BcSSgyBb3FeqZGPC5zxgBH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Jul 2023 09:32:45 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Jul 2023 10:57:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[OpenSSH vulnerability: A red warning sign on a background of code, denoting malware and cyber attacks]]></media:description>                                                            <media:text><![CDATA[OpenSSH vulnerability: A red warning sign on a background of code, denoting malware and cyber attacks]]></media:text>
                                <media:title type="plain"><![CDATA[OpenSSH vulnerability: A red warning sign on a background of code, denoting malware and cyber attacks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Rubrik appoints Zscaler’s Sean Sullivan as director of alliances for EMEA ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/leadership/rubrik-appoints-zscalers-sean-sullivan-as-director-of-alliances-for-emea</link>
                                                                            <description>
                            <![CDATA[ The cyber sales veteran will lead the development of Rubrik’s partnership capabilities and sales strategy across the region ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">j9Da9esGhLHBQuF9qHHcGY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PLTssNANQ2exnSHMYEeyBR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 12 Jul 2023 11:10:08 +0000</pubDate>                                                                                                                                <updated>Wed, 19 Jul 2023 09:05:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Leadership]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PLTssNANQ2exnSHMYEeyBR-1280-80.jpg">
                                                            <media:credit><![CDATA[Rubrik]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Rubrik&#039;s Sean Sullivan headshot with grey background]]></media:description>                                                            <media:text><![CDATA[Rubrik&#039;s Sean Sullivan headshot with grey background]]></media:text>
                                <media:title type="plain"><![CDATA[Rubrik&#039;s Sean Sullivan headshot with grey background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PLTssNANQ2exnSHMYEeyBR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Telefónica Tech and F5 unveil new service to protect enterprise applications ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/telefonica-tech-and-f5-unveil-new-service-to-protect-enterprise-applications</link>
                                                                            <description>
                            <![CDATA[ The new Web Application Defense (WAD) managed service will help enterprise customers detect threats and vulnerabilities in real time ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8eYWADmuP6EdVrGJg7Fo6j</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NEjje87dAuG8WVNiQvoKSF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Jul 2023 10:43:10 +0000</pubDate>                                                                                                                                <updated>Thu, 06 Jul 2023 13:31:18 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/NEjje87dAuG8WVNiQvoKSF-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Telefónica Tech: A series of blue blocks with binary code displayed alongside yellow padlocks]]></media:description>                                                            <media:text><![CDATA[Telefónica Tech: A series of blue blocks with binary code displayed alongside yellow padlocks]]></media:text>
                                <media:title type="plain"><![CDATA[Telefónica Tech: A series of blue blocks with binary code displayed alongside yellow padlocks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NEjje87dAuG8WVNiQvoKSF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC neutralizes fewer cyber crime campaigns for first time in six years ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/ncsc-neutralizes-fewer-cyber-crime-campaigns-for-first-time-in-six-years</link>
                                                                            <description>
                            <![CDATA[ Drop in takedowns may be due to short lifetimes of extortion email servers and crypto scams ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eHaqoHsan8Q7QD5ZR3UFka</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Jul 2023 10:37:40 +0000</pubDate>                                                                                                                                <updated>Thu, 06 Jul 2023 13:23:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:description>                                                            <media:text><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:text>
                                <media:title type="plain"><![CDATA[NCSC logo superimposed with a translucent background in front of an office building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xVTMjZ6UmEQAhwxsGt2JDC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is platform engineering and will it see the end of DevSecOps? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/development/what-is-platform-engineering-and-will-it-see-the-end-of-devsecops</link>
                                                                            <description>
                            <![CDATA[ Platform engineering is not just the latest industry buzzword but could represent a profound change in how software is developed and governed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">a5bHuKxHMhmY8rGfTvbebP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/psr4hnun2R4R2jEq9AeSU4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Jul 2023 08:32:19 +0000</pubDate>                                                                                                                                <updated>Tue, 11 Jul 2023 14:03:57 +0000</updated>
                                                                                                                                            <category><![CDATA[Development]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/psr4hnun2R4R2jEq9AeSU4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A digital circuit board]]></media:description>                                                            <media:text><![CDATA[A digital circuit board]]></media:text>
                                <media:title type="plain"><![CDATA[A digital circuit board]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/psr4hnun2R4R2jEq9AeSU4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cloud attacks rise but majority of sensitive data remains unencrypted ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/cloud-attacks-rise-but-majority-of-sensitive-data-remains-unencrypted</link>
                                                                            <description>
                            <![CDATA[ Thales’ latest Cloud Security Report shows how managing and protecting data in the cloud is becoming an increasingly complex task for organizations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">px2xDLFgbnPStPMHtv4MJH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mBwh4N9qw7ibycfqL7Adw7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 05 Jul 2023 11:01:45 +0000</pubDate>                                                                                                                                <updated>Wed, 05 Jul 2023 14:38:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mBwh4N9qw7ibycfqL7Adw7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cloud attacks depicted by a digital mockup of a cloud floating above a circuitboard, all in a futuristic-looking colour scheme of neon blue, purple and yellow]]></media:description>                                                            <media:text><![CDATA[Cloud attacks depicted by a digital mockup of a cloud floating above a circuitboard, all in a futuristic-looking colour scheme of neon blue, purple and yellow]]></media:text>
                                <media:title type="plain"><![CDATA[Cloud attacks depicted by a digital mockup of a cloud floating above a circuitboard, all in a futuristic-looking colour scheme of neon blue, purple and yellow]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mBwh4N9qw7ibycfqL7Adw7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Rubrik partners with Microsoft to drive generative AI-powered cyber recovery ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/rubrik-partners-with-microsoft-to-drive-generative-ai-powered-cyber-recovery</link>
                                                                            <description>
                            <![CDATA[ Rubrik Security Cloud will integrate with Microsoft Sentinel and Azure OpenAI to accelerate recovery from cyber attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LpcTqqaFxf82HwDjGAnVS8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/jYWhBayTGsrCrUWDnNjSSi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jun 2023 11:06:19 +0000</pubDate>                                                                                                                                <updated>Mon, 03 Jul 2023 13:42:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/jYWhBayTGsrCrUWDnNjSSi-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Rubrik logo appearing on a background of dark blue]]></media:description>                                                            <media:text><![CDATA[Rubrik logo appearing on a background of dark blue]]></media:text>
                                <media:title type="plain"><![CDATA[Rubrik logo appearing on a background of dark blue]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/jYWhBayTGsrCrUWDnNjSSi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malwarebytes bolsters reseller partner program with fresh incentives ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/business-strategy/malwarebytes-bolsters-reseller-partner-program-with-fresh-incentives</link>
                                                                            <description>
                            <![CDATA[ The revamped initiative aims to help partners generate profitable, consistent business growth and target specific vertical markets ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">v9N78PTpUQGAwgtomEwbui</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pqgNcUerzdpWFUYNVYW9cd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 21 Jun 2023 11:36:43 +0000</pubDate>                                                                                                                                <updated>Thu, 24 Apr 2025 18:07:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Business Strategy]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pqgNcUerzdpWFUYNVYW9cd-1280-80.jpg">
                                                            <media:credit><![CDATA[Malwarebytes]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malwarebytes logo on blue background]]></media:description>                                                            <media:text><![CDATA[Malwarebytes logo on blue background]]></media:text>
                                <media:title type="plain"><![CDATA[Malwarebytes logo on blue background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pqgNcUerzdpWFUYNVYW9cd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researchers uncover novel RDStealer malware targeting remote desktop protocol ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/researchers-uncover-novel-rdstealer-malware-targeting-remote-desktop-protocol</link>
                                                                            <description>
                            <![CDATA[ Bitdefender's experts said the level of disguise observed in this campaign “surpasses anything witnessed thus far” ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">K53G9Kqz62qKYdpDzyhBYB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/o7aE2bbqGF7TeVESbqgZfb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 20 Jun 2023 10:50:01 +0000</pubDate>                                                                                                                                <updated>Tue, 20 Jun 2023 15:34:56 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/o7aE2bbqGF7TeVESbqgZfb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RDStealer: Mockup of brigtly coloured alert with code and a warning sign, reading &#039;malware&#039;]]></media:description>                                                            <media:text><![CDATA[RDStealer: Mockup of brigtly coloured alert with code and a warning sign, reading &#039;malware&#039;]]></media:text>
                                <media:title type="plain"><![CDATA[RDStealer: Mockup of brigtly coloured alert with code and a warning sign, reading &#039;malware&#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/o7aE2bbqGF7TeVESbqgZfb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Report: UK lags behind US in auditing code for security flaws ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/development/report-uk-lags-behind-us-in-auditing-code-for-security-flaws</link>
                                                                            <description>
                            <![CDATA[ The CTO of open source software firm SUSE suggested the US’ DevOps maturity can be attributed to the difference in aptitude ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">iFfCvHH7eJQ7g8dsFJnfzQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/5gPaRMAUcbUoDU6UJ54oTE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 20 Jun 2023 10:10:04 +0000</pubDate>                                                                                                                                <updated>Tue, 20 Jun 2023 15:11:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Development]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/5gPaRMAUcbUoDU6UJ54oTE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Programmer writing code on a laptop and second larger display]]></media:description>                                                            <media:text><![CDATA[Programmer writing code on a laptop and second larger display]]></media:text>
                                <media:title type="plain"><![CDATA[Programmer writing code on a laptop and second larger display]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/5gPaRMAUcbUoDU6UJ54oTE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Six generative AI cyber security threats and how to mitigate them ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/six-generative-ai-cyber-security-threats-and-how-to-mitigate-them</link>
                                                                            <description>
                            <![CDATA[ What are the risks posed by generative AI and how can businesses protect themselves? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UyaoyhhdDMPVDuWxHKUctT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/U4MhnPA9zTWxjpZqWccBeS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 19 Jun 2023 07:00:39 +0000</pubDate>                                                                                                                                <updated>Fri, 17 May 2024 15:28:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Technology]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/U4MhnPA9zTWxjpZqWccBeS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A digital brain coloured in red]]></media:description>                                                            <media:text><![CDATA[A digital brain coloured in red]]></media:text>
                                <media:title type="plain"><![CDATA[A digital brain coloured in red]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/U4MhnPA9zTWxjpZqWccBeS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyware cuts ribbon on new global partner program ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/business-strategy/cyware-cuts-ribbon-on-new-global-partner-program</link>
                                                                            <description>
                            <![CDATA[ The CywareOne initiative aims to equip partners with “the tools they need to differentiate themselves in the market” ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">owyny3Uz9GEKuGbUyoCkhN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u4dqPobeLPG8tKHTgEAPBC-1280-80.jpeg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 16 Jun 2023 09:59:15 +0000</pubDate>                                                                                                                                <updated>Thu, 24 Apr 2025 18:07:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Business Strategy]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u4dqPobeLPG8tKHTgEAPBC-1280-80.jpeg">
                                                            <media:credit><![CDATA[Cyware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyware logo on white background]]></media:description>                                                            <media:text><![CDATA[Cyware logo on white background]]></media:text>
                                <media:title type="plain"><![CDATA[Cyware logo on white background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u4dqPobeLPG8tKHTgEAPBC-1280-80.jpeg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything you need to know about the latest Windows 11 updates - from bug fixes to brand-new features ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/windows/everything-you-need-to-know-about-the-latest-windows-11-updates-from-bug-fixes-to-brand-new-features</link>
                                                                            <description>
                            <![CDATA[ Two new cumulative updates are on the way and will be installed automatically on Windows 10 and Windows 11 machines ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Tc8Gakjv3ybjUkgZvac7m8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ecqqzhaeTJbyTBMiTyGzNe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 14 Jun 2023 11:11:01 +0000</pubDate>                                                                                                                                <updated>Thu, 15 Jun 2023 13:53:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Windows]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                    <category><![CDATA[Microsoft]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ecqqzhaeTJbyTBMiTyGzNe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Windows logo appearing on a smartphone set against a bright Windows logo taking up the entire background]]></media:description>                                                            <media:text><![CDATA[Windows logo appearing on a smartphone set against a bright Windows logo taking up the entire background]]></media:text>
                                <media:title type="plain"><![CDATA[Windows logo appearing on a smartphone set against a bright Windows logo taking up the entire background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ecqqzhaeTJbyTBMiTyGzNe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Log4J exploits may rise further as Microsoft continues war on phishing ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/log4j-exploits-may-rise-further-as-microsoft-continues-war-on-phishing</link>
                                                                            <description>
                            <![CDATA[ Despite Log4J patches being made almost immediately in 2021, exploit attempts are still in the tens of millions ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hxrXBRVjzFQXCEuyB4XCUG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/y8abhoQWdvEHQQfbBgpqEn-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 12 Jun 2023 10:45:58 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 11:32:15 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ connor.jones@futurenet.com (Connor Jones) ]]></author>                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/y8abhoQWdvEHQQfbBgpqEn-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Log4J: Hacker&#039;s hand hovering over an illuminated MacBook keyboard - an image denoting hacking]]></media:description>                                                            <media:text><![CDATA[Log4J: Hacker&#039;s hand hovering over an illuminated MacBook keyboard - an image denoting hacking]]></media:text>
                                <media:title type="plain"><![CDATA[Log4J: Hacker&#039;s hand hovering over an illuminated MacBook keyboard - an image denoting hacking]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/y8abhoQWdvEHQQfbBgpqEn-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Arctic Wolf expands $1 million security operations warranty to Europe and ANZ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/arctic-wolf-expands-dollar1-million-security-operations-warranty-to-europe-and-anz</link>
                                                                            <description>
                            <![CDATA[ Qualifying customers now have access to fully underwritten financial assistance of up to $1 million in the event of a cyber attack ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vqzBRxQvd5fwk8o5UTdvJd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/HtMzNHSiMiAUAvku5ChTxa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 09 Jun 2023 10:02:42 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 10:47:26 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/HtMzNHSiMiAUAvku5ChTxa-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Arctic Wolf: Cyber security insurance and risk management mockup]]></media:description>                                                            <media:text><![CDATA[Arctic Wolf: Cyber security insurance and risk management mockup]]></media:text>
                                <media:title type="plain"><![CDATA[Arctic Wolf: Cyber security insurance and risk management mockup]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/HtMzNHSiMiAUAvku5ChTxa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Deep Instinct appoints new channel chief for the Americas ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/leadership/deep-instinct-appoints-new-channel-chief-for-the-americas</link>
                                                                            <description>
                            <![CDATA[ Jim Ortbals will lead the firm’s channel operations in the region, Ryan Vaupel becomes vice president of operations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Zb8jMoWXcvSi9odyvBGir3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RmcjdmeyCgmizTWhhmJ5Fj-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jun 2023 12:00:18 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 10:44:47 +0000</updated>
                                                                                                                                            <category><![CDATA[Leadership]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RmcjdmeyCgmizTWhhmJ5Fj-1280-80.jpg">
                                                            <media:credit><![CDATA[Deep Instinct]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Deep Instinct company logo]]></media:description>                                                            <media:text><![CDATA[Deep Instinct company logo]]></media:text>
                                <media:title type="plain"><![CDATA[Deep Instinct company logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RmcjdmeyCgmizTWhhmJ5Fj-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security consolidation is about improving results, not just cost savings ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/security-consolidation-is-about-improving-results-not-just-cost-savings</link>
                                                                            <description>
                            <![CDATA[ Channel partners can play a key role in enabling businesses to consolidate security operations and bolster resilience ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">HVExvNtPcxZxxpseyT3kBm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JiT3Ap3nyi8dqAUWbuxrF7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 07 Jun 2023 11:00:00 +0000</pubDate>                                                                                                                                <updated>Thu, 24 Apr 2025 19:45:19 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Matthew Middleton-Leal ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JiT3Ap3nyi8dqAUWbuxrF7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Security padlock operating on the electronic circuit CPU]]></media:description>                                                            <media:text><![CDATA[Security padlock operating on the electronic circuit CPU]]></media:text>
                                <media:title type="plain"><![CDATA[Security padlock operating on the electronic circuit CPU]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JiT3Ap3nyi8dqAUWbuxrF7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Change individual behavior to improve cyber security, says expert ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/change-individual-behavior-to-improve-cyber-security-says-expert</link>
                                                                            <description>
                            <![CDATA[ Organizations can deliver as much cyber security training as they want, but its value is limited unless it leads to actual behavior change ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vviBWPpsAb7wGvnQPWQXnS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6GmAUwkXyW5Jc2jmHzCqgM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 25 May 2023 15:19:15 +0000</pubDate>                                                                                                                                <updated>Tue, 30 May 2023 13:53:12 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6GmAUwkXyW5Jc2jmHzCqgM-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Oz Alashe speakign on stage at Dell Technologies World 2023]]></media:description>                                                            <media:text><![CDATA[Oz Alashe speakign on stage at Dell Technologies World 2023]]></media:text>
                                <media:title type="plain"><![CDATA[Oz Alashe speakign on stage at Dell Technologies World 2023]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6GmAUwkXyW5Jc2jmHzCqgM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Building channel resilience in 2023 and beyond ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/business-strategy/building-channel-resilience-in-2023-and-beyond</link>
                                                                            <description>
                            <![CDATA[ Building a resilient, robust channel ecosystem could be key to weathering current economic trends ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aHxyj3CkYk6aR8u7h3V2PG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dFqDip9EuemFdcyNcg8By8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 24 May 2023 11:30:00 +0000</pubDate>                                                                                                                                <updated>Thu, 24 Apr 2025 19:46:21 +0000</updated>
                                                                                                                                            <category><![CDATA[Business Strategy]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ John Nolan ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dFqDip9EuemFdcyNcg8By8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Full length side view of young man climbing up on blue bar graphs against white background]]></media:description>                                                            <media:text><![CDATA[Full length side view of young man climbing up on blue bar graphs against white background]]></media:text>
                                <media:title type="plain"><![CDATA[Full length side view of young man climbing up on blue bar graphs against white background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dFqDip9EuemFdcyNcg8By8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Do risk awareness and risk management strategies actually make a difference? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/do-risk-awareness-and-risk-management-strategies-actually-make-a-difference</link>
                                                                            <description>
                            <![CDATA[ If cyber attacks are a matter of when, not if, it's tempting to ask whether risk awareness and risk management are effective ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">HUHw8f89tHe7WPYLLjT26W</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/whPJc65oQLRkoJomfojyEd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 24 May 2023 09:31:49 +0000</pubDate>                                                                                                                                <updated>Wed, 24 May 2023 16:51:02 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sandra Vogel ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/whPJc65oQLRkoJomfojyEd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Several green locked padlocks surrounding one orange unlocked padlock]]></media:description>                                                            <media:text><![CDATA[Several green locked padlocks surrounding one orange unlocked padlock]]></media:text>
                                <media:title type="plain"><![CDATA[Several green locked padlocks surrounding one orange unlocked padlock]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/whPJc65oQLRkoJomfojyEd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Rogue IT worker extorted company after hijacking ransomware attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/rogue-it-worker-extorted-company-after-hijacking-ransomware-attack</link>
                                                                            <description>
                            <![CDATA[ Liles’ involvement in the scheme was revealed after unauthorized email access was traced to his home address ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">inLzNr2YLCf32ZjYyvRzXH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wb7MoJ27V8eh4C6Wz8GW9Y-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 24 May 2023 08:59:51 +0000</pubDate>                                                                                                                                <updated>Thu, 25 May 2023 07:24:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wb7MoJ27V8eh4C6Wz8GW9Y-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Abstract Technology Binary Code Dark Red Background]]></media:description>                                                            <media:text><![CDATA[Abstract Technology Binary Code Dark Red Background]]></media:text>
                                <media:title type="plain"><![CDATA[Abstract Technology Binary Code Dark Red Background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wb7MoJ27V8eh4C6Wz8GW9Y-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ExtraHop now lets business leaders see how safely employees are using generative AI ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-protection/extrahop-now-lets-business-leaders-see-how-safely-employees-are-using-generative-ai</link>
                                                                            <description>
                            <![CDATA[ The Reveal(x) platform now provides insights into potential data leaks to help protect against misuse of AI tools such as ChatGPT ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">z4PdNukpkPRiorDoZW9jSF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ECqSLRa3EpxwcRcj9aZnqX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 May 2023 11:49:57 +0000</pubDate>                                                                                                                                <updated>Wed, 24 May 2023 08:39:38 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ECqSLRa3EpxwcRcj9aZnqX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI: neon blue human head (right-side profile) with particle overlay to denote AI]]></media:description>                                                            <media:text><![CDATA[AI: neon blue human head (right-side profile) with particle overlay to denote AI]]></media:text>
                                <media:title type="plain"><![CDATA[AI: neon blue human head (right-side profile) with particle overlay to denote AI]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ECqSLRa3EpxwcRcj9aZnqX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Inside the platform propping up the next generation of email crime ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/inside-the-platform-propping-up-the-next-generation-of-email-crime</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals are flocking to BulletProftLink for additional protections as business email compromise surges ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QYkkUoCiJ6eCepMBSqAwY7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DhCuUCKmYpJZLZNejqvrd4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 May 2023 11:41:34 +0000</pubDate>                                                                                                                                <updated>Wed, 24 May 2023 08:37:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ connor.jones@futurenet.com (Connor Jones) ]]></author>                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DhCuUCKmYpJZLZNejqvrd4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[BulletProftLink: Email security multicoloured mockup image]]></media:description>                                                            <media:text><![CDATA[BulletProftLink: Email security multicoloured mockup image]]></media:text>
                                <media:title type="plain"><![CDATA[BulletProftLink: Email security multicoloured mockup image]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DhCuUCKmYpJZLZNejqvrd4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The rise of identity-based cyber attacks and how to mitigate them ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-rise-of-identity-based-cyber-attacks-and-how-to-mitigate-them</link>
                                                                            <description>
                            <![CDATA[ If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Dmdzt3Pb6T2ghHcUFX3EiF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 09 May 2023 08:20:49 +0000</pubDate>                                                                                                                                <updated>Tue, 09 May 2023 08:46:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sandra Vogel ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks]]></media:description>                                                            <media:text><![CDATA[The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks]]></media:text>
                                <media:title type="plain"><![CDATA[The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why zero trust strategies fail ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/five-zero-trust-pitfalls-to-avoid</link>
                                                                            <description>
                            <![CDATA[ Zero Trust is the gold standard for organizations in protecting systems from cyber attacks, but there are many common implementation pitfalls businesses must avoid ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BL5vEydYUKbCiZEKFHDJZi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/D6ZFS3xgHqChAfbizUojYN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 05 May 2023 07:00:24 +0000</pubDate>                                                                                                                                <updated>Fri, 05 May 2023 08:44:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sandra Vogel ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/D6ZFS3xgHqChAfbizUojYN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A shot of a woman sat at her desk in a dimly lit office, with her eyes closed and a stressed expression on her face, her hands raised to massage her temples. In the foreground, blue code is rising to either side of the frame to indicate complexity in the task that her unseen screen is showing]]></media:description>                                                            <media:text><![CDATA[A shot of a woman sat at her desk in a dimly lit office, with her eyes closed and a stressed expression on her face, her hands raised to massage her temples. In the foreground, blue code is rising to either side of the frame to indicate complexity in the task that her unseen screen is showing]]></media:text>
                                <media:title type="plain"><![CDATA[A shot of a woman sat at her desk in a dimly lit office, with her eyes closed and a stressed expression on her face, her hands raised to massage her temples. In the foreground, blue code is rising to either side of the frame to indicate complexity in the task that her unseen screen is showing]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/D6ZFS3xgHqChAfbizUojYN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malware being pushed to businesses by search engines remains a pervasive threat ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware-being-pushed-to-businesses-by-search-engines-remains-a-pervasive-threat</link>
                                                                            <description>
                            <![CDATA[ High-profile malvertising campaigns in recent months have surged ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pchGDUBTRbnkWNFyK5X3N3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 02 May 2023 11:37:34 +0000</pubDate>                                                                                                                                <updated>Tue, 02 May 2023 12:55:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware and security denoted by blue and gold mockup of motherboard with lock]]></media:description>                                                            <media:text><![CDATA[Malware and security denoted by blue and gold mockup of motherboard with lock]]></media:text>
                                <media:title type="plain"><![CDATA[Malware and security denoted by blue and gold mockup of motherboard with lock]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google Cloud’s new security AI will explain how you’ve been breached ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/google-clouds-new-security-ai-will-explain-how-youve-been-breached</link>
                                                                            <description>
                            <![CDATA[ The new suite of tools could prove vital to security practitioners reacting to incidents in real-time ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5wMuBk39wDKzze8WqfP8BB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/eGBuw7HPn9vDjv5Gf2jZwg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Apr 2023 10:46:04 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Apr 2023 08:32:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/eGBuw7HPn9vDjv5Gf2jZwg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Google Cloud Platform logo displayed on their stand during the Mobile World Congress 2023]]></media:description>                                                            <media:text><![CDATA[The Google Cloud Platform logo displayed on their stand during the Mobile World Congress 2023]]></media:text>
                                <media:title type="plain"><![CDATA[The Google Cloud Platform logo displayed on their stand during the Mobile World Congress 2023]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/eGBuw7HPn9vDjv5Gf2jZwg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Outpost24 appoints M&A expert Brendan Hogan as chief strategy officer ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/leadership/outpost24-appoints-manda-expert-brendan-hogan-as-chief-strategy-officer</link>
                                                                            <description>
                            <![CDATA[ The former VMware executive will lead the cyber security firm’s long-term product strategy and growth ambitions ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BmCiVdquEBNMDx4nDecMpW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xEUqeBavsXFWBjLvZNJkYK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Apr 2023 10:26:26 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Apr 2023 16:20:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Leadership]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xEUqeBavsXFWBjLvZNJkYK-1280-80.jpg">
                                                            <media:credit><![CDATA[Outpost24]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Outpost24 company logo]]></media:description>                                                            <media:text><![CDATA[Outpost24 company logo]]></media:text>
                                <media:title type="plain"><![CDATA[Outpost24 company logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xEUqeBavsXFWBjLvZNJkYK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI acceleration represents a ‘tectonic shift’ for DevSecOps ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/development/ai-tectonic-shift-for-devsecops-gitlab</link>
                                                                            <description>
                            <![CDATA[ David DeSanto, chief product officer at GitLab, believes there’s still much more to come for AI use cases in DevSecOps ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BKaqDa3ppREbGXk33WeyMD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7Z9RWN6uMPPppzJwvHxTWE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Apr 2023 13:00:01 +0000</pubDate>                                                                                                                                <updated>Mon, 24 Apr 2023 11:14:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Development]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7Z9RWN6uMPPppzJwvHxTWE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The GitLab logo on a smartphone in front of a background of data]]></media:description>                                                            <media:text><![CDATA[The GitLab logo on a smartphone in front of a background of data]]></media:text>
                                <media:title type="plain"><![CDATA[The GitLab logo on a smartphone in front of a background of data]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7Z9RWN6uMPPppzJwvHxTWE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CyberCX appoints Phil Mason as new UK CEO ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/leadership/cybercx-appoints-phil-mason-as-new-uk-ceo</link>
                                                                            <description>
                            <![CDATA[ Industry veteran will lead CyberCX’s growth efforts in the UK ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZynQA7BLzETZLfdQbMchoU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 19 Apr 2023 09:00:09 +0000</pubDate>                                                                                                                                <updated>Thu, 20 Apr 2023 06:13:04 +0000</updated>
                                                                                                                                            <category><![CDATA[Leadership]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:description>                                                            <media:text><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:text>
                                <media:title type="plain"><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft angers admins as April Patch Tuesday delivers password feature without migration guidance ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/windows/microsoft-april-patch-tuesday-password-feature</link>
                                                                            <description>
                            <![CDATA[ Security fixes include a zero day exploited by a ransomware group and seven critical flaws ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">92PXHhi4fpg7Cv4b8VNdFn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ecqqzhaeTJbyTBMiTyGzNe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 12 Apr 2023 11:51:19 +0000</pubDate>                                                                                                                                <updated>Thu, 13 Apr 2023 09:40:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Windows]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                    <category><![CDATA[Microsoft]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ecqqzhaeTJbyTBMiTyGzNe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Windows logo appearing on a smartphone set against a bright Windows logo taking up the entire background]]></media:description>                                                            <media:text><![CDATA[Windows logo appearing on a smartphone set against a bright Windows logo taking up the entire background]]></media:text>
                                <media:title type="plain"><![CDATA[Windows logo appearing on a smartphone set against a bright Windows logo taking up the entire background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ecqqzhaeTJbyTBMiTyGzNe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Can we ever achieve cyber security buy-in? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-security/370285/can-we-ever-achieve-cyber-security-buy-in</link>
                                                                            <description>
                            <![CDATA[ Members of the IT Pro Network share their experiences of trying to encourage good cyber hygiene in the workplace ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hfSr9KpLcgMpfpn95zXurW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Bix86UMXkwxbu6LBeZ9Yh7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Mar 2023 16:33:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Bix86UMXkwxbu6LBeZ9Yh7-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A woman using her phone as a device for 2FA]]></media:description>                                                            <media:text><![CDATA[A woman using her phone as a device for 2FA]]></media:text>
                                <media:title type="plain"><![CDATA[A woman using her phone as a device for 2FA]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Bix86UMXkwxbu6LBeZ9Yh7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Kali Linux releases first-ever defensive distro with score of new tools ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/enterprise-security/370257/kali-linux-releases-first-ever-defensive-distro-score-new-tools</link>
                                                                            <description>
                            <![CDATA[ Kali Purple marks the next step for the red-teaming platform on the project's tenth anniversary ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">unrADLURAspNaGwLVwKfnV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DXyATm7k6CbbwJC5rPAeCK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Mar 2023 12:00:46 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DXyATm7k6CbbwJC5rPAeCK-1280-80.jpg">
                                                            <media:credit><![CDATA[Kali / Offensive Security]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A screenshot of a Linux operating system with Kali Purple windows open on the desktop and a stylised dragon in the background next to the text &amp;#039;KALI&amp;#039;]]></media:description>                                                            <media:text><![CDATA[A screenshot of a Linux operating system with Kali Purple windows open on the desktop and a stylised dragon in the background next to the text &amp;#039;KALI&amp;#039;]]></media:text>
                                <media:title type="plain"><![CDATA[A screenshot of a Linux operating system with Kali Purple windows open on the desktop and a stylised dragon in the background next to the text &amp;#039;KALI&amp;#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DXyATm7k6CbbwJC5rPAeCK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Freshworks CISO Jason Loomis embraces the ‘shift left’ amid surging supply chain threats ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business-strategy/chief-information-security-officer-ciso/369909/freshworks-ciso-jason-loomis</link>
                                                                            <description>
                            <![CDATA[ Fewer than 100 days in the role, Jason Loomis reveals his plans for the future of security at Freshworks, and discusses the rising threat of API vulnerablities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rXgU6stQK2ukNtkKpoFE8b</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/95VBDPk5uxUzj8tEd2d9pH-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Jan 2023 09:19:48 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/95VBDPk5uxUzj8tEd2d9pH-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close-up photo of Jason Loomis, CISO at Freshworks]]></media:description>                                                            <media:text><![CDATA[Close-up photo of Jason Loomis, CISO at Freshworks]]></media:text>
                                <media:title type="plain"><![CDATA[Close-up photo of Jason Loomis, CISO at Freshworks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/95VBDPk5uxUzj8tEd2d9pH-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT Pro Podcast: Going passwordless ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/enterprise-security/369814/the-it-pro-podcast-going-passwordless</link>
                                                                            <description>
                            <![CDATA[ Something you are, or something you have, could be more important than a password you know in the near future ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gFLpzoAsrEnfKmzKDL7anB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VcYM9FMqT7ivC3FzghbsLW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Jan 2023 13:05:41 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VcYM9FMqT7ivC3FzghbsLW-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;Going passwordless&amp;#039;]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;Going passwordless&amp;#039;]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;Going passwordless&amp;#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VcYM9FMqT7ivC3FzghbsLW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Podcast transcript: Going passwordless ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/enterprise-security/369815/podcast-transcript-going-passwordless</link>
                                                                            <description>
                            <![CDATA[ Read the full transcript for this episode of the IT Pro Podcast ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uoaH42Y3cyW7SJ5m8ruydz</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PbzYT7jCw5MrPbZDydLWCY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Jan 2023 12:40:05 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PbzYT7jCw5MrPbZDydLWCY-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;Going passwordless&amp;#039;]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;Going passwordless&amp;#039;]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast logo with the episode title &amp;#039;Going passwordless&amp;#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PbzYT7jCw5MrPbZDydLWCY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Lab-based cyber attacks are no serious threat – yet ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-security/369536/lab-based-cyber-attacks-are-no-serious-threat-yet</link>
                                                                            <description>
                            <![CDATA[ There’s no need to fret when it comes to research-based cyber security threats, but the future is a different matter ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3WjC8JbuWeYZVeSVvx9W3N</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dXT8s6c5LBeXubNquhNhG5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 19 Nov 2022 08:00:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Davey Winder ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dXT8s6c5LBeXubNquhNhG5-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A cyber security researcher at their desk]]></media:description>                                                            <media:text><![CDATA[A cyber security researcher at their desk]]></media:text>
                                <media:title type="plain"><![CDATA[A cyber security researcher at their desk]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dXT8s6c5LBeXubNquhNhG5-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>