<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Newswire</title>
    <description>
      <![CDATA[Daily news stories from around the world for the security executive. ]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2189-security-newswire</link>
    <language>en-us</language>
    <item>
      <title>Netherlands Faces Greatest National Security Threat Since World War Two</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Dutch intelligence agency AIVD says the Netherlands is facing the greatest national security threat in decades.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102263</guid>
      <pubDate>Fri, 24 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102263-netherlands-faces-greatest-national-security-threat-since-world-war-two</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Netherlands-on-a-map-by-KOBU-Agency.webp?t=1777047639" type="image/png" length="401733"/>
    </item>
    <item>
      <title>How Physical Security Data Is Supporting Public Safety Challenges</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The use of physical security data is driven predominantly by concerns for officer safety.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102262</guid>
      <pubDate>Fri, 24 Apr 2026 12:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102262-how-physical-security-data-is-supporting-public-safety-challenges</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Security-guard-in-hallway-by-Izzuddin-Azzam.webp?t=1777045012" type="image/png" length="320589"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Claude Mythos Breach </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>What security experts are saying about the Claude Mythos breach.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102253</guid>
      <pubDate>Thu, 23 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102253-security-leaders-discuss-the-claude-mythos-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-by-Igor-Omilaev.webp?t=1776956192" type="image/png" length="845851"/>
    </item>
    <item>
      <title>NIST’s New Prioritization Criteria for CVEs, Examined by Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">NIST recently changed how it handles CVEs.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102255</guid>
      <pubDate>Thu, 23 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102255-nists-new-prioritization-criteria-for-cves-examined-by-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/Green-padlock-on-keyboard-by-rupixen.webp?t=1776955351" type="image/png" length="306013"/>
    </item>
    <item>
      <title>Unauthorized Users Accessed Claude Mythos, New Reports Suggest</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Anthropic’s new AI model may have been accessed by unauthorized users.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102251</guid>
      <pubDate>Wed, 22 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102251-unauthorized-users-accessed-claude-mythos-new-reports-suggest</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-in-darkness-by-Hostaphoto.webp?t=1776877073" type="image/png" length="125623"/>
    </item>
    <item>
      <title>Why Bridging Siloes Doesn’t Need to Be Complicated</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Bruce McIndoe provides actionable steps for bridging siloes.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102240</guid>
      <pubDate>Wed, 22 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102240-why-bridging-siloes-doesnt-need-to-be-complicated</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/McIndoe-podcast-news-header.webp?t=1776785504" type="image/png" length="120498"/>
    </item>
    <item>
      <title>Hackers Claim 19M Records Stolen From French Government Agency</title>
      <author></author>
      <description>
        <![CDATA[<p>The <span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">France Titres&nbsp;<span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">discovered a security incident.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102248</guid>
      <pubDate>Wed, 22 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102248-hackers-claim-19m-records-stolen-from-french-government-agency</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/French-flag-by-Rafael-Garcin.webp?t=1776860491" type="image/png" length="263048"/>
    </item>
    <item>
      <title>Safe Learning 101 Program Supports Schools in Strengthening Campus Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security </em>magazine speaks with the&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">expert partner behind this program.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102237</guid>
      <pubDate>Tue, 21 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102237-safe-learning-101-program-supports-schools-in-strengthening-campus-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Stacked-books-by-Kimberly-Farmer.webp?t=1776895794" type="image/png" length="348053"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Vercel Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders are discussing the Vercel breach.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102246</guid>
      <pubDate>Tue, 21 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102246-security-leaders-discuss-the-vercel-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Office-supplies-by-Amy-Hirschi.webp?t=1776783392" type="image/png" length="332942"/>
    </item>
    <item>
      <title>US Security Agency Leverages Claude Mythos Despite Pentagon Blacklist</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Reports suggest that the NSA is using Claude Mythos.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102243</guid>
      <pubDate>Mon, 20 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102243-us-security-agency-leverages-claude-mythos-despite-pentagon-blacklist</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Aerial-view-of-America-by-NASA.webp?t=1776702474" type="image/png" length="629203"/>
    </item>
    <item>
      <title>Vercel Breach Originated From an Employee’s AI Tool</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>This breach occurred due to a <span style=" font-style: normal; font-weight: 400; letter-spacing: 0.1px; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">third-party AI tool.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102242</guid>
      <pubDate>Mon, 20 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102242-vercel-breach-originated-from-an-employees-ai-tool</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Computer-in-darkness-by-Nikita-Kachanovsky.webp?t=1776699474" type="image/png" length="299046"/>
    </item>
    <item>
      <title>58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A recent report by Cloudsmith found that 31% of organizations using AI-generated code spend 10 hours or less per month validating, auditing, or securing it.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102241</guid>
      <pubDate>Mon, 20 Apr 2026 10:23:28 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102241-58-of-organizations-spend-over-10-hours-a-month-securing-ai-generated-code</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/chris-ried-ieic5Tq8YMk-unsplash.webp?t=1776694909" type="image/jpeg" length="132731"/>
    </item>
    <item>
      <title>Top 3 Cyber Insurance Incident Claims</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A new report reveals the top three cyber incidents that account for a majority of reported claims.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102232</guid>
      <pubDate>Mon, 20 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102232-top-3-cyber-insurance-incident-claims</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/Laptop-keyboard-in-gradient-colorful-light-by-Jonas-Vandermeiren.webp?t=1776442444" type="image/png" length="151909"/>
    </item>
    <item>
      <title>Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Peter Mandelson, a former British ambassador to the United States, failed security vetting clearance before taking his position.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102239</guid>
      <pubDate>Fri, 17 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102239-former-uk-ambassador-linked-to-epstein-failed-security-vetting-yet-received-clearance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/Man-silhouette-by-Ben-Sweet.webp?t=1776895795" type="image/png" length="42896"/>
    </item>
    <item>
      <title>ICE Acting Director Todd Lyons to Resign</title>
      <author></author>
      <description>
        <![CDATA[<p>ICE acting director Todd Lyons is set to resign at the end of May.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102238</guid>
      <pubDate>Fri, 17 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102238-ice-acting-director-todd-lyons-to-resign</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/American-flag-by-Joshua-Hoehne.webp?t=1776895795" type="image/png" length="545767"/>
    </item>
    <item>
      <title>What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">OpenAI has launched GPT-5.4-Cyber, a model optimized for defensive cybersecurity usage.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102235</guid>
      <pubDate>Thu, 16 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102235-what-are-security-experts-saying-about-openais-gpt-54-cyber</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Golden-lights-by-Joshua-Sortino.webp?t=1776273162" type="image/png" length="929161"/>
    </item>
    <item>
      <title>McGraw Hill Data Breach Caused by Salesforce Misconfiguration</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>McGraw Hill announced a data breach connected to a Salesforce misconfiguration.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102233</guid>
      <pubDate>Wed, 15 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102233-mcgraw-hill-data-breach-caused-by-salesforce-misconfiguration</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Student-desks-in-a-room-by-Allen-Y.webp?t=1776266704" type="image/png" length="428886"/>
    </item>
    <item>
      <title>Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods</title>
      <author></author>
      <description>
        <![CDATA[<p>Venice’s hydraulic pump system was hacked. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102231</guid>
      <pubDate>Tue, 14 Apr 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102231-venice-hydraulic-pump-system-hacked-hackers-claim-power-to-create-floods</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/14/Venice-by-Kit-Suman.webp?t=1776276358" type="image/png" length="771305"/>
    </item>
    <item>
      <title>Pro-Iranian Actor Claims L.A. Metro Cyberattack</title>
      <author></author>
      <description>
        <![CDATA[<p>New intelligence suggests a pro-Iranian actor is responsible for the L.A. Metro cyberattack.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102230</guid>
      <pubDate>Tue, 14 Apr 2026 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102230-pro-iranian-actor-claims-la-metro-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/14/LA-Metro-by-Rio-Space.webp?t=1776276358" type="image/png" length="514918"/>
    </item>
    <item>
      <title>3 Quantum Realities to Confront this World Quantum Day</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>3 quantum realities security leaders need to confront.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102229</guid>
      <pubDate>Tue, 14 Apr 2026 08:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102229-3-quantum-realities-to-confront-this-world-quantum-day</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/13/Transparent-cube-and-colorful-squares-by-David-Clode.webp?t=1776099451" type="image/png" length="686636"/>
    </item>
    <item>
      <title>Booking.com Customer Data Hacked, Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p>Booking.com is warning customers that their information may have been exposed.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102228</guid>
      <pubDate>Mon, 13 Apr 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102228-bookingcom-customer-data-hacked-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/13/Luggage-by-Erwan-Hesry.webp?t=1776083275" type="image/png" length="595112"/>
    </item>
    <item>
      <title>Top Secret Clearance Holder Charged With Leaking Classified National Defense Information</title>
      <author></author>
      <description>
        <![CDATA[<p>Former Army employee indicted for allegedly sharing classified national defense information to unauthorized individuals.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102227</guid>
      <pubDate>Fri, 10 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102227-top-secret-clearance-holder-charged-with-leaking-classified-national-defense-information</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/10/Gavel-by-Sasun-Bughdaryan.webp?t=1775836839" type="image/png" length="307749"/>
    </item>
    <item>
      <title>What Are Security Experts Saying About Claude Mythos and Project Glasswing?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security experts share their thoughts on Claude Mythos and Project Glasswing with <em>Security </em>magazine.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102226</guid>
      <pubDate>Fri, 10 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102226-what-are-security-experts-saying-about-claude-mythos-and-project-glasswing</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/10/Abstract-shape-by-Kanhaiya-Sharma.webp?t=1775834774" type="image/png" length="88935"/>
    </item>
    <item>
      <title>Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Data has allegedly been stolen from a state-run Chinese supercomputer.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102225</guid>
      <pubDate>Thu, 09 Apr 2026 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102225-chinese-supercomputer-allegedly-hacked-10-petabytes-of-data-stolen</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/09/Cables-plugged-in-by-Scott-Rodgerson.webp?t=1775761808" type="image/png" length="464149"/>
    </item>
    <item>
      <title>Baltimore Security Guards On Strike</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Baltimore security guards are participating in a strike.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102224</guid>
      <pubDate>Thu, 09 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102224-baltimore-security-guards-on-strike</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/09/Security-guard-by-Job-Moses.webp?t=1775745846" type="image/png" length="279444"/>
    </item>
    <item>
      <title>Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>CISA warns that Iranian-connected cyber actors are focusing U.S. critical infrastructure. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102221</guid>
      <pubDate>Wed, 08 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102221-iranian-linked-cyber-actors-target-us-critical-infrastructure-security-leaders-respond</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/08/Power-lines-by-Yuan-Yang.webp?t=1775663200" type="image/png" length="497945"/>
    </item>
    <item>
      <title>LAPD Records Hacked and Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A data breach&nbsp;</span>has lead to the exposure of sensitive LAPD records.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102215</guid>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102215-lapd-records-hacked-and-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/08/Police-in-road-by-AJ-Colores.webp?t=1775656677" type="image/png" length="765393"/>
    </item>
    <item>
      <title>New Trump Administration Budget Cuts $707M from CISA Funding</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>The White House plans to cut $707M from CISA funding.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102213</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102213-new-trump-administration-budget-cuts-707m-from-cisa-funding</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/07/United-States-capitol-by-Louis-Velazquez.webp?t=1775573360" type="image/png" length="590390"/>
    </item>
    <item>
      <title>Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders discuss this breach and share insights.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102207</guid>
      <pubDate>Mon, 06 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102207-breach-of-fbi-surveillance-system-considered-a-major-incident-security-experts-weigh-in</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/06/Padlock-with-computer-keys-by-FlyD.webp?t=1775486057" type="image/png" length="508835"/>
    </item>
    <item>
      <title>World Cloud Security Day: Breaking Down the State of Cloud Cybersecurity and Physical Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>
A snapshot of the state of the cloud in cybersecurity and physical security.&nbsp;</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102204</guid>
      <pubDate>Fri, 03 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102204-world-cloud-security-day-breaking-down-the-state-of-the-cloud-cybersecurity-and-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/Cloud-security-by-Growtika.webp?t=1775232056" type="image/png" length="255866"/>
    </item>
  </channel>
</rss>
