<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/uk/feeds/tag/security" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro UK in Security ]]></title>
                <link>https://www.itpro.com/uk/security</link>
        <description><![CDATA[ All the latest security content from the ITPro  UK team ]]></description>
                                    <lastBuildDate>Fri, 01 May 2026 10:39:01 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Researchers warn millions of RDP and VNC servers are wide open to exploitation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/researchers-warn-millions-of-rdp-and-vnc-servers-are-wide-open-to-exploitation</link>
                                                                            <description>
                            <![CDATA[ Researchers at Forescout spotted millions of RDP and VNC servers exposed online ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gkWGoJ8YRpZKiuFzLmL6kj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 May 2026 10:39:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:description>                                                            <media:text><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'Depressingly familiar': Cyber Security Breaches Survey shows work still to be done on cyber preparedness ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/depressingly-familiar-cyber-security-breaches-survey-shows-work-still-to-be-done-on-cyber-preparedness</link>
                                                                            <description>
                            <![CDATA[ The government's annual cybersecurity report shows organizations are failing to shore up security capabilities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3kPgaf3eXCUXY8R2ucCh9Q</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 May 2026 10:06:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Enterprises are adopting agents faster than they can secure and govern them – experts warn it’s a disaster waiting to happen ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/enterprises-are-adopting-agents-faster-than-they-can-secure-and-govern-them-experts-warn-its-a-disaster-waiting-to-happen</link>
                                                                            <description>
                            <![CDATA[ Identity systems developed for human interaction fail to cope with the new demands ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZNS99FFXfZRPCT59whwfcf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PbaraXgyBf5cecgbD4TJLU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 30 Apr 2026 11:22:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PbaraXgyBf5cecgbD4TJLU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An illustration showing an AI agent side profile, depicted as a blue robot, with seven human faces in varying earthy metallic tones shown to the right.]]></media:description>                                                            <media:text><![CDATA[An illustration showing an AI agent side profile, depicted as a blue robot, with seven human faces in varying earthy metallic tones shown to the right.]]></media:text>
                                <media:title type="plain"><![CDATA[An illustration showing an AI agent side profile, depicted as a blue robot, with seven human faces in varying earthy metallic tones shown to the right.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PbaraXgyBf5cecgbD4TJLU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK firms left in the dark over what workers are sharing with AI ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-protection/uk-firms-left-in-the-dark-over-what-workers-are-sharing-with-ai</link>
                                                                            <description>
                            <![CDATA[ Security teams can’t keep track of what workers are sharing with AI applications, regardless of whether they’re approved or unauthorized ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Eo7ShySuZws95AM5KSTsqD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/agHuoixY7A7CvZEbCApv4g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 30 Apr 2026 07:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/agHuoixY7A7CvZEbCApv4g-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Businesswoman holding handheld device while walking in an abstract data center environment made up of blocks with bright colored data lines flowing on ground.]]></media:description>                                                            <media:text><![CDATA[Businesswoman holding handheld device while walking in an abstract data center environment made up of blocks with bright colored data lines flowing on ground.]]></media:text>
                                <media:title type="plain"><![CDATA[Businesswoman holding handheld device while walking in an abstract data center environment made up of blocks with bright colored data lines flowing on ground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/agHuoixY7A7CvZEbCApv4g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ North Korean hackers are duping freelance developers with fake interviews to steal cryptocurrency and deliver malware — Sophos warns the 'Nickel Alley' group is using LinkedIn, Upwork, and Fiverr to target victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/north-korean-hackers-are-duping-freelance-developers-with-fake-interviews-to-steal-cryptocurrency-and-deliver-malware-sophos-warns-the-nickel-alley-group-is-using-linkedin-upwork-and-fiverr-to-target-victims</link>
                                                                            <description>
                            <![CDATA[ A fake interview process uses coding tests and repo downloads to deliver malware ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VLS4GwTGb87a7DRvRmQrAm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rBaWcKkPGkJSvaRS3NHzSB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 29 Apr 2026 11:06:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rBaWcKkPGkJSvaRS3NHzSB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[North Korean hacker concept image showing a man in military uniform working on a laptop computer with flag of North Korea pictured on screen in background.]]></media:description>                                                            <media:text><![CDATA[North Korean hacker concept image showing a man in military uniform working on a laptop computer with flag of North Korea pictured on screen in background.]]></media:text>
                                <media:title type="plain"><![CDATA[North Korean hacker concept image showing a man in military uniform working on a laptop computer with flag of North Korea pictured on screen in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rBaWcKkPGkJSvaRS3NHzSB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Monetizing the quantum shift: 11 PQC channel opportunities ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/monetizing-the-quantum-shift-11-pqc-channel-opportunities</link>
                                                                            <description>
                            <![CDATA[ Channel partners must lead clients through the post-quantum cryptography transition now. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MYNZ56iPZtxwcFXAZGe2wE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 28 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                <updated>Fri, 01 May 2026 14:53:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Todd Beldham ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Pay up or expect attrition: 77% of cyber professionals missed out on pay rises last year – and almost half now plan to switch roles ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/pay-up-or-expect-attrition-77-percent-of-cyber-professionals-missed-out-on-pay-rises-last-year-and-almost-half-now-plan-to-switch-roles</link>
                                                                            <description>
                            <![CDATA[ Organizations are overlooking cyber pros when it comes to pay increases, and it could cost them dearly ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CoeMP7KTNSy5cvcNaifhZ5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oRFZnA3a5Z9hTEPbjNLnGV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 27 Apr 2026 10:56:38 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oRFZnA3a5Z9hTEPbjNLnGV-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Concept image showing female office worker quitting her job and leaving with office supplies in a cardboard box.]]></media:description>                                                            <media:text><![CDATA[Concept image showing female office worker quitting her job and leaving with office supplies in a cardboard box.]]></media:text>
                                <media:title type="plain"><![CDATA[Concept image showing female office worker quitting her job and leaving with office supplies in a cardboard box.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oRFZnA3a5Z9hTEPbjNLnGV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/threat-actors-ditch-spray-and-pray-attacks-in-shift-to-targeted-exploitation</link>
                                                                            <description>
                            <![CDATA[ A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aXZoaaEbmpsecTfCYFaZAL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Apr 2026 11:19:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:description>                                                            <media:text><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:text>
                                <media:title type="plain"><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why supply chain resilience is under the spotlight ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-is-supply-chain-resilience-under-the-spotlight</link>
                                                                            <description>
                            <![CDATA[ As attackers continue to target third party suppliers, what can firms do to boost resilience? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hbqvq9oqVQoU6gzZeYTNGW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital chain concept art]]></media:description>                                                            <media:text><![CDATA[Digital chain concept art]]></media:text>
                                <media:title type="plain"><![CDATA[Digital chain concept art]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A ‘perfect storm’: NCSC chief issues warning over quantum threats, nation-state hackers, and the dangers of global ‘hacktivism’  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/a-perfect-storm-ncsc-chief-issues-warning-over-quantum-threats-nation-state-hackers-and-the-dangers-of-global-hacktivism</link>
                                                                            <description>
                            <![CDATA[ NCSC CEO Richard Horne says nation-state attacks, AI and the looming quantum threat require stronger global collaboration ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jkUTJkTdCc6AQEQJN3uNAB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 12:25:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:description>                                                            <media:text><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:text>
                                <media:title type="plain"><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NCSC says it’s time to switch to passkeys ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-ncsc-says-its-time-to-switch-to-passkeys</link>
                                                                            <description>
                            <![CDATA[ UK security organization calls for companies to step up and offer more secure ways to login ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jaYhRKhMTS3hbYHkehkCrY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 11:21:25 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:description>                                                            <media:text><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:text>
                                <media:title type="plain"><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'The goal for this year will be to automate all security processes': Google Cloud is betting on Wiz to usher in a new era of AI security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-goal-for-this-year-will-be-to-automate-all-security-processes-google-cloud-is-betting-on-wiz-to-usher-in-a-new-era-of-ai-security</link>
                                                                            <description>
                            <![CDATA[ Wiz wants to deploy its agents for continuous penetration testing, and in Google it’s found a parent company that can achieve this vision at scale ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ctMeUtSErHFYBMQui96CMY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N3B3FC3PLDnt7g9MWxz368-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 09:24:25 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N3B3FC3PLDnt7g9MWxz368-1280-80.jpg">
                                                            <media:credit><![CDATA[ITPro/Rory Bathgate]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Francis deSouza, COO and president of security products at Google Cloud, pictured speaking on stage at Google Cloud Next 2026 in Las Vegas. ]]></media:description>                                                            <media:text><![CDATA[Francis deSouza, COO and president of security products at Google Cloud, pictured speaking on stage at Google Cloud Next 2026 in Las Vegas. ]]></media:text>
                                <media:title type="plain"><![CDATA[Francis deSouza, COO and president of security products at Google Cloud, pictured speaking on stage at Google Cloud Next 2026 in Las Vegas. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N3B3FC3PLDnt7g9MWxz368-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ "Consumer messaging apps were never designed to handle sensitive communications" – Government decision-makers are confused about messaging security, BlackBerry report finds  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/consumer-messaging-apps-were-never-designed-to-handle-sensitive-communications-government-decision-makers-are-confused-about-messaging-security-blackberry-report-finds</link>
                                                                            <description>
                            <![CDATA[ Despite official warnings, they're still routinely using WhatsApp for confidential communications ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fGsoY59uzYUrvLLHNCL5jj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WawfjQpvXwUCFfi5h3GuB9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 22 Apr 2026 09:43:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WawfjQpvXwUCFfi5h3GuB9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ business man using a smartphone]]></media:description>                                                            <media:text><![CDATA[ business man using a smartphone]]></media:text>
                                <media:title type="plain"><![CDATA[ business man using a smartphone]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WawfjQpvXwUCFfi5h3GuB9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Enterprises are preparing for a post-quantum world – experts worry it could be too late for many ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/post-quantum-encryption-enterprise-preparation-juniper-research</link>
                                                                            <description>
                            <![CDATA[ More than 100 million firms are expected to embrace post-quantum algorithms by 2035, but that's just a drop in the ocean ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">C7HBQAwgvxFWMcdasKuS34</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/d5ftRe88HMZW8wcJtCZDsJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Apr 2026 23:05:00 +0000</pubDate>                                                                                                                                <updated>Wed, 22 Apr 2026 08:08:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/d5ftRe88HMZW8wcJtCZDsJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Quantum cybersecurity concept image showing a quantum chip with glowing lights connected to a digital interface and circuit board. ]]></media:description>                                                            <media:text><![CDATA[Quantum cybersecurity concept image showing a quantum chip with glowing lights connected to a digital interface and circuit board. ]]></media:text>
                                <media:title type="plain"><![CDATA[Quantum cybersecurity concept image showing a quantum chip with glowing lights connected to a digital interface and circuit board. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/d5ftRe88HMZW8wcJtCZDsJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know about the Vercel data breach so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/everything-we-know-about-the-vercel-data-breach-so-far</link>
                                                                            <description>
                            <![CDATA[ An OAuth supply chain compromise saw 'non-sensitive' Vercel data compromised and some internal systems accessed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">R8bnDH65phHDUjYQcpj2v</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/nVJtF4erHdUjd43hfPHEeE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Apr 2026 11:07:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/nVJtF4erHdUjd43hfPHEeE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo and branding of cloud development platform Vercel pictured on a smartphone screen with blurred multi-colored background.]]></media:description>                                                            <media:text><![CDATA[Logo and branding of cloud development platform Vercel pictured on a smartphone screen with blurred multi-colored background.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo and branding of cloud development platform Vercel pictured on a smartphone screen with blurred multi-colored background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/nVJtF4erHdUjd43hfPHEeE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zoom launches new verification features to tackle AI impersonation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/zoom-ai-impersonation-verification-tools-for-humanity-world-id-deep-face</link>
                                                                            <description>
                            <![CDATA[ Growing concerns over AI impersonation techniques have prompted new features from Zoom ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">22NAC7spCMeSMV6Ys2bEUA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JkT3uQefMSXSwVZ246RijJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Apr 2026 14:58:42 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JkT3uQefMSXSwVZ246RijJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Zoom logo illuminated in white against a black background at the company&#039;s exhibitor stall at ISE 2025 in Barcelona, Spain.]]></media:description>                                                            <media:text><![CDATA[Zoom logo illuminated in white against a black background at the company&#039;s exhibitor stall at ISE 2025 in Barcelona, Spain.]]></media:text>
                                <media:title type="plain"><![CDATA[Zoom logo illuminated in white against a black background at the company&#039;s exhibitor stall at ISE 2025 in Barcelona, Spain.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JkT3uQefMSXSwVZ246RijJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Brit pleads guilty amid Scattered Spider hacking spree claims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/scattered-spider-alleged-hacker-pleads-guilt-us</link>
                                                                            <description>
                            <![CDATA[ Tyler Robert Buchanan faces 10 years in jail if found guilty ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Bq2ME3BkRZW4Mz79qoUzUa</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BydygnrmuGZSc59ZaH58w3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Apr 2026 14:40:19 +0000</pubDate>                                                                                                                                <updated>Tue, 21 Apr 2026 11:41:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BydygnrmuGZSc59ZaH58w3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hands illuminated by laptop keyboard buttons while typing in a dimly lit room.]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hands illuminated by laptop keyboard buttons while typing in a dimly lit room.]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hands illuminated by laptop keyboard buttons while typing in a dimly lit room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BydygnrmuGZSc59ZaH58w3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The race to become quantum-safe ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-race-to-become-quantum-safe</link>
                                                                            <description>
                            <![CDATA[ Efforts to run AI in trusted regions can clash with access to frontier model updates, business scalability ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mqhk2ZQDzeuB9kmaBrG8FQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:37:23 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:description>                                                            <media:text><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/tycoon-2fa-phishing-risk-takedown-barracuda</link>
                                                                            <description>
                            <![CDATA[ Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vXDsxDKKWbMUkuvkVXXwHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:05:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI is now a ‘standard part of the attacker toolkit’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-is-now-a-standard-part-of-the-attacker-toolkit</link>
                                                                            <description>
                            <![CDATA[ Cyber attacks are increasing in scale, intensity, and velocity thanks to AI, and it’s forcing defenders to react faster than ever before ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DqEmGSrrE9d4TbkQUfA2TR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Apr 2026 13:46:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:description>                                                            <media:text><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:text>
                                <media:title type="plain"><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NIST is overhauling the National Vulnerability Database due to skyrocketing reports – experts worry it will ‘leave many CVEs on the table’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/nist-national-vulnerability-database-overhaul-increased-cve-submissions</link>
                                                                            <description>
                            <![CDATA[ Drowning in CVEs, the NIST agency will now fully analyze only the most severe vulnerabilities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3Lam554yt6kJYYjv5YT2A8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Apr 2026 11:11:04 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:description>                                                            <media:text><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:text>
                                <media:title type="plain"><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI and Data are reshaping the MSP landscape, but hackers are getting in on the hot AI action ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-and-data-are-reshaping-the-msp-landscape-but-hackers-are-getting-in-on-the-hot-ai-action</link>
                                                                            <description>
                            <![CDATA[ AI is no longer just a buzzword; it's a hacker's dream and the channel's biggest opportunity ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mUbhnMn8zbQFxvU3uEVKxe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 14:39:04 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Apr 2026 14:47:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rene Millman) ]]></author>                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:description>                                                            <media:text><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI agents using Anthropic MCP could be a vector for supply chain attacks, claim researchers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-agents-using-anthropic-mcp-supply-chain-attacks-claim-researchers</link>
                                                                            <description>
                            <![CDATA[ The flaw in Anthropic’s Model Context Protocol agent communication standard could put millions of agents and 200,000 servers at risk, report says ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pCRDgxhtKFCjEcbXEWtrjJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 13:32:17 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:description>                                                            <media:text><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:text>
                                <media:title type="plain"><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Brace yourselves for a vulnerability explosion, Forescout warns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/brace-yourselves-for-a-vulnerability-explosion-forescout-warns</link>
                                                                            <description>
                            <![CDATA[ AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">B5ZMSGYc6xxyRVXqD2VVdB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 13:26:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[the Forescout logo]]></media:description>                                                            <media:text><![CDATA[the Forescout logo]]></media:text>
                                <media:title type="plain"><![CDATA[the Forescout logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security leaders overconfident about ransomware recovery ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/security-leaders-overconfident-about-ransomware-recovery</link>
                                                                            <description>
                            <![CDATA[ Few manage to recover all their data, and many experience business disruption ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bV89CY9avfhwgcdKxFmGWV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 12:21:24 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Apr 2026 13:30:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Most organizations make a mess of handling digital disruption ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/most-organizations-make-a-mess-of-handling-digital-disruption</link>
                                                                            <description>
                            <![CDATA[ Poor governance and a lack of collaboration with suppliers and partners can lead to disaster ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">owBpxF4E8GNwJ54H7iBFFh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Apr 2026 13:00:11 +0000</pubDate>                                                                                                                                <updated>Tue, 14 Apr 2026 14:02:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Only 34% of cyber professionals plan to stay in their current role ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/only-34-percent-of-cyber-professionals-plan-to-stay-in-their-current-role</link>
                                                                            <description>
                            <![CDATA[ Offer regular wage progression, invest in culture and security, and offer flexible work arrangements if you want them to stay, advises IANS. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fPLw6vKVKejYwD9pnmdgv6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Apr 2026 12:24:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:description>                                                            <media:text><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:text>
                                <media:title type="plain"><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How the explosion in machine identities is changing cyber defense ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/how-machine-identities-changing-cyber-defense</link>
                                                                            <description>
                            <![CDATA[ The rapid adoption of machine identities such as AI agents is creating new vulnerabilities and fresh challenges for IT teams ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PxskTThjGGy5ef9P4ZDoo7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 13 Apr 2026 12:20:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Justin Pugsley ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:description>                                                            <media:text><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Beyond wipers: Iran-backed cyber attacks and the threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/beyond-wipers-iran-backed-cyber-attacks-and-the-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ What’s the real risk to business in the US and UK during this critical situation? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZSqjakTNDPMf7AhXB8NrHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:54:47 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:57:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:description>                                                            <media:text><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:text>
                                <media:title type="plain"><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI is raising the stakes for cyber professionals – Claude Mythos just took things to another level ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-is-raising-the-stakes-for-cyber-professionals-claude-mythos-just-took-things-to-another-level</link>
                                                                            <description>
                            <![CDATA[ AI efficiency gains work both ways, and threat actors are already capitalizing on powerful new tools ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dBWcYZ5aLKUG9LP9zn3Zb4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:39:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:description>                                                            <media:text><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:text>
                                <media:title type="plain"><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zephyr Energy hackers swiped £700,000 after redirecting a contractor payment ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/zephyr-energy-hackers-swiped-gbp700-000-after-redirecting-a-contractor-payment</link>
                                                                            <description>
                            <![CDATA[ Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m6aEtDpzcUUX6suSr8UbWg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:17:04 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:45:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Agent identity governance can't keeping up with adoption rates – and it’s creating a security nightmare ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/agent-identity-governance-cant-keeping-up-with-adoption-rates-and-its-creating-a-security-nightmare</link>
                                                                            <description>
                            <![CDATA[ Enterprises are leaving high-privilege keys unchanged for months or years at a time ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">N82g7W3zaCU9k6GTFjUXbE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 11:37:17 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why incident response has become a core responsibility for MSPs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-incident-response-has-become-a-core-responsibility-for-msps</link>
                                                                            <description>
                            <![CDATA[ MSPs must prioritise incident response as core capability amid rising cyber threats ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PABAqp8dpYi6cBwutrqXbL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Phil Chapman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:description>                                                            <media:text><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:text>
                                <media:title type="plain"><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC issues alert over Russian hacker campaign targeting SOHO routers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-issues-alert-over-russian-hacker-campaign-targeting-soho-routers</link>
                                                                            <description>
                            <![CDATA[ The APT28 group has exploited vulnerable internet routers to covertly reroute internet traffic through malicious servers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zMzke9FPNtPBx5CW9Pdyrb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Apr 2026 09:46:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:description>                                                            <media:text><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ German authorities want your help finding the hackers behind GandCrab and REvil  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/german-authorities-want-your-help-finding-the-hackers-behind-gandcrab-and-revil</link>
                                                                            <description>
                            <![CDATA[ Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fdDCDsuwTqeNGjcqnLSn5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 07 Apr 2026 11:12:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ "If you think your day to day job as a CISO is hard, wait until you're dealing with a major breach": why your business needs cyber insurance ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-your-business-needs-cyber-insurance</link>
                                                                            <description>
                            <![CDATA[ As the cyber insurance market matures, do firms actually need it and if so, how should they choose a policy? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jXdMuyyrUfAef5DdgWC2bM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:description>                                                            <media:text><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft and NCSC issue alerts over hacker campaigns targeting WhatsApp, Signal messaging apps ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/microsoft-and-ncsc-issue-alerts-over-hacker-campaigns-targeting-whatsapp-signal-messaging-apps</link>
                                                                            <description>
                            <![CDATA[ Microsoft warns about a sophisticated attack that starts with WhatsApp messages, while the NCSC says such incidents are on the rise ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LJTnJm6NstRzVvKFnCmeyd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Apr 2026 06:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:description>                                                            <media:text><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:text>
                                <media:title type="plain"><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know about the Hasbro hack so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/everything-we-know-about-the-hasbro-hack-so-far</link>
                                                                            <description>
                            <![CDATA[ The toy-maker keeps running thanks to business continuity plans, but nature of attack remains unclear ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pq7yt8ovg9sPv6isiVGHmW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 02 Apr 2026 11:55:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:description>                                                            <media:text><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:text>
                                <media:title type="plain"><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Proton is launching its own ‘private alternative’ to Google Workspace and Microsoft 365 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/proton-is-launching-its-own-private-alternative-to-google-workspace-and-microsoft-365</link>
                                                                            <description>
                            <![CDATA[ The launch of Proton Workspace comes amid rising tensions over data sovereignty and privacy ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZobRzdLbNTxJQReKuk3cpR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u2PDmAGAXR36UZCRJhSNzf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 02 Apr 2026 09:54:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u2PDmAGAXR36UZCRJhSNzf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Proton logo and branding, including &#039;Privacy by Default&#039; term, pictured in blue lettering on a white wall.]]></media:description>                                                            <media:text><![CDATA[Proton logo and branding, including &#039;Privacy by Default&#039; term, pictured in blue lettering on a white wall.]]></media:text>
                                <media:title type="plain"><![CDATA[Proton logo and branding, including &#039;Privacy by Default&#039; term, pictured in blue lettering on a white wall.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u2PDmAGAXR36UZCRJhSNzf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 78% of UK manufacturers have experienced a cyber incident in the last year – and more than half have taken a revenue hit ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/78-percent-of-uk-manufacturers-have-experienced-a-cyber-incident-in-the-last-year-and-more-than-half-have-taken-a-revenue-hit</link>
                                                                            <description>
                            <![CDATA[ Last year's attack on Jaguar Land Rover shows the costs can be very significant indeed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ht53X8coopDXx6QSFPRBKf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 23:05:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘There was a manual deploy step that should have been better automated’: Claude Code creator confirms cause of massive source code leak  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/there-was-a-manual-deploy-step-that-should-have-been-better-automated-claude-code-creator-confirms-cause-of-massive-source-code-leak</link>
                                                                            <description>
                            <![CDATA[ Over half a million lines of Claude Code source code was leaked, with the company attributing the blunder to human error ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4p7UxnQFNVUTER5HGoCWaC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bKWbECsE5Qnj7e5jMR7JqR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 15:58:52 +0000</pubDate>                                                                                                                                <updated>Thu, 02 Apr 2026 11:09:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bKWbECsE5Qnj7e5jMR7JqR-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Anthropic&#039;s Claude AI tool imposed over computer source code.]]></media:description>                                                            <media:text><![CDATA[Logo of Anthropic&#039;s Claude AI tool imposed over computer source code.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Anthropic&#039;s Claude AI tool imposed over computer source code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bKWbECsE5Qnj7e5jMR7JqR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘The build pipeline is becoming the new frontline’: Axios npm compromise highlights growing software supply chain risks, experts warn ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-build-pipeline-is-becoming-the-new-frontline-axios-npm-compromise-highlights-growing-software-supply-chain-risks-experts-warn</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals exploited a hijacked maintainer account to compromise one of the world's most widely used JavaScript libraries ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FtT83GNxmPjbmsmBPsDEnS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 10:32:11 +0000</pubDate>                                                                                                                                <updated>Wed, 01 Apr 2026 14:13:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ European Commission confirms data breach as ShinyHunters group claims responsibility ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/european-commission-confirms-data-breach-as-shinyhunters-group-claims-responsibility</link>
                                                                            <description>
                            <![CDATA[ The extortion group is believed to be behind a cyber attack affecting the Commission's cloud systems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hq482EVjAgSjmX4sJSjdDM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Aaozf8FqfVDo3iYRAoFZtg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 30 Mar 2026 09:57:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Aaozf8FqfVDo3iYRAoFZtg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Facade of the Berlaymont building, headquarters of the European Commission, in Brussels, with EU flags fluttering in the wind.]]></media:description>                                                            <media:text><![CDATA[Facade of the Berlaymont building, headquarters of the European Commission, in Brussels, with EU flags fluttering in the wind.]]></media:text>
                                <media:title type="plain"><![CDATA[Facade of the Berlaymont building, headquarters of the European Commission, in Brussels, with EU flags fluttering in the wind.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Aaozf8FqfVDo3iYRAoFZtg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI challenges mean it's time to shine for cyber professionals – but they need a helping hand ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-challenges-time-to-shine-for-cyber-professionals-but-they-need-a-helping-hand</link>
                                                                            <description>
                            <![CDATA[ Keep your security pros close, you never know when you’ll need them to solve an AI-related crisis ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TaJQF8PmQPZKPrrUCUzXwi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 13:07:44 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Two cybersecurity professionals in a modern office.]]></media:description>                                                            <media:text><![CDATA[Two cybersecurity professionals in a modern office.]]></media:text>
                                <media:title type="plain"><![CDATA[Two cybersecurity professionals in a modern office.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ March rundown: RSAC warnings and Arm's AGI CPU ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/march-rundown-rsac-warnings-and-arms-agi-cpu</link>
                                                                            <description>
                            <![CDATA[ AI agents are complicating the jobs of cyber professionals, with broken permissions and a lack of oversight posing major risks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">magHjcbrLU5hpi2ceBGV7n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7id7L8fhU8ZsMxnCymQurH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 13:01:20 +0000</pubDate>                                                                                                                                <updated>Wed, 01 Apr 2026 15:54:57 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7id7L8fhU8ZsMxnCymQurH-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;RSAC warnings and Arm&#039;s AGI CPU&quot; against noisy, purple glowing outline of a chip. The words &quot;RSAC&quot; and &quot;Arm&#039;s&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:description>                                                            <media:text><![CDATA[The text &quot;RSAC warnings and Arm&#039;s AGI CPU&quot; against noisy, purple glowing outline of a chip. The words &quot;RSAC&quot; and &quot;Arm&#039;s&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;RSAC warnings and Arm&#039;s AGI CPU&quot; against noisy, purple glowing outline of a chip. The words &quot;RSAC&quot; and &quot;Arm&#039;s&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7id7L8fhU8ZsMxnCymQurH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google just revised its ‘Q-Day’ timeline: Quantum computers could break existing encryption techniques within three years – and enterprises are nowhere near ready ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-just-revised-its-q-day-timeline-quantum-computers-could-break-existing-encryption-techniques-within-three-years-and-enterprises-are-nowhere-near-ready</link>
                                                                            <description>
                            <![CDATA[ Google has warned that “Q-Day”, the point where a quantum computer is powerful enough to crack current encryption techniques, could come as soon as 2029. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tkw3hgP3bfnfhYdj7dLPZV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 10:30:29 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenAI is cracking down on AI misuse with a new bug bounty program ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/open-ai-targets-ai-misuse-crackdown-with-new-bug-bounty-program</link>
                                                                            <description>
                            <![CDATA[ Submissions don't have to be security vulnerabilities, OpenAI says, just the potential to cause material harm ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qdADLecdshLbpnnpRn8yt7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4CfCNLi89rRyAkt4Ut9qtV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 09:12:54 +0000</pubDate>                                                                                                                                <updated>Fri, 27 Mar 2026 12:25:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4CfCNLi89rRyAkt4Ut9qtV-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close-up photograph of the OpenAI logo and branding on a smartphone screen, with faint warm orange lighting in background.]]></media:description>                                                            <media:text><![CDATA[Close-up photograph of the OpenAI logo and branding on a smartphone screen, with faint warm orange lighting in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Close-up photograph of the OpenAI logo and branding on a smartphone screen, with faint warm orange lighting in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4CfCNLi89rRyAkt4Ut9qtV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LiteLLM PyPI compromise: Everything we know so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/litellm-pypi-compromise-everything-we-know-so-far</link>
                                                                            <description>
                            <![CDATA[ The TeamPCP hacking group is believed to have successfully backdoored the package to harvest credentials ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vtaXFmN8hjj39BM8iGwyKJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 10:56:03 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Systems are deterministic, people are probabilistic – AI is both, and that's a headache for cyber teams  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/systems-are-deterministic-people-are-probabilistic-ai-is-both-and-thats-a-headache-for-cyber-teams</link>
                                                                            <description>
                            <![CDATA[ AI combines both the risks associated with IT systems and the people using them, creating headaches for practitioners ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8VLzS7mBsEbtwpxLM4mgBm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4QoKscLUUMCfLwSt4SxwhH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 07:29:41 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4QoKscLUUMCfLwSt4SxwhH-1280-80.jpg">
                                                            <media:credit><![CDATA[RSAC™ 2026 Conference]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RSAC 2026 Conference branding pictured on a banner at the Moscone Center in San Francisco, USA.]]></media:description>                                                            <media:text><![CDATA[RSAC 2026 Conference branding pictured on a banner at the Moscone Center in San Francisco, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[RSAC 2026 Conference branding pictured on a banner at the Moscone Center in San Francisco, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4QoKscLUUMCfLwSt4SxwhH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Tenable co-CEO Stephen Vintz says enterprises need to get serious about tackling the AI “responsibility gap” ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/tenable-co-ceo-stephen-vintz-says-enterprises-need-to-get-serious-about-tackling-the-ai-responsibility-gap</link>
                                                                            <description>
                            <![CDATA[ The Tenable chief wants a serious conversation on AI ownership and accountability ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ty87LyLntCiNRFLDaUe8u7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/x9sA2oW4PrD5HGM5o2k8RD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 07:08:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/x9sA2oW4PrD5HGM5o2k8RD-1280-80.jpg">
                                                            <media:credit><![CDATA[RSAC™ 2026 Conference]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RSAC 2026 conference logos and branding pictured on screens and projected onto carpet at the Moscone Center in San Francisco, USA.]]></media:description>                                                            <media:text><![CDATA[RSAC 2026 conference logos and branding pictured on screens and projected onto carpet at the Moscone Center in San Francisco, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[RSAC 2026 conference logos and branding pictured on screens and projected onto carpet at the Moscone Center in San Francisco, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/x9sA2oW4PrD5HGM5o2k8RD-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>