<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Logical Security</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: monsitj (iStock / Getty Images Plus)</em></p>

<p>Learn about logical security strategies and technologies that protect digital assets, data, and networks from unauthorized access and cyber threats.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2229-logical-security</link>
    <language>en-us</language>
    <item>
      <title>Reframing MFA Bypass: Four Identity Gaps Attackers Exploit </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The misnomer of ‘MFA Bypass’ keeps MFA at the center of a problem it cannot solve alone.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102304</guid>
      <pubDate>Mon, 18 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102304-reframing-mfa-bypass-four-identity-gaps-attackers-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/15/Laptop-in-darkness-by-Hostaphoto.webp?t=1778859466" type="image/png" length="125623"/>
    </item>
    <item>
      <title>Research: Microsoft Edge Loads Stored Passwords in Cleartext</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>A researcher found that Microsoft Edge will load <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">saved passwords into memory in plaintext, even when they are not being used.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102294</guid>
      <pubDate>Thu, 07 May 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102294-research-microsoft-edge-loads-stored-passwords-in-cleartext</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1778170941" type="image/png" length="282476"/>
    </item>
    <item>
      <title>Will This World Password Day Be the Last?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102293</guid>
      <pubDate>Thu, 07 May 2026 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102293-will-this-world-password-day-be-the-last</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Keys-on-yellow-background-by-Alp-Duran.webp?t=1778167213" type="image/png" length="411957"/>
    </item>
    <item>
      <title>Synthetic Identities Are Redefining Trust in Biometric Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102291</guid>
      <pubDate>Thu, 07 May 2026 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102291-synthetic-identities-are-redefining-trust-in-biometric-systems</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1778076735" type="image/png" length="201182"/>
    </item>
    <item>
      <title>The Coming Wave of Large-Scale Al-Enabled Cyberattacks</title>
      <description>
        <![CDATA[<p>The first truly major AI-enabled cyberattack will look different from the incidents that dominate headlines today.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102281</guid>
      <pubDate>Mon, 04 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102281-the-coming-wave-of-large-scale-al-enabled-cyberattacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/Coding-on-laptop-by-Ilnur.webp?t=1777647542" type="image/png" length="414130"/>
    </item>
    <item>
      <title>The Browser Blind Spot Your Privacy Program Is Missing </title>
      <description>
        <![CDATA[<p>Most privacy&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">programs still have one gap in common: the browser.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102279</guid>
      <pubDate>Fri, 01 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102279-the-browser-blind-spot-your-privacy-program-is-missing</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/30/Laptop-with-crumbled-papers-by-Lauren-Mancke.webp?t=1777575702" type="image/png" length="452930"/>
    </item>
    <item>
      <title>What Claude and OpenClaw Vulnerabilities Reveal About AI Agents</title>
      <description>
        <![CDATA[<p>Claude and OpenClaw vulnerabilities reveal why AI agents must be governed like privileged identities.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102257</guid>
      <pubDate>Fri, 24 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102257-what-claude-and-openclaw-vulnerabilities-reveal-about-ai-agents</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-up-close-by-Igor-Omilaev.webp?t=1776966219" type="image/png" length="445428"/>
    </item>
    <item>
      <title>Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption</title>
      <description>
        <![CDATA[<p>While vulnerability management and patching remain necessary, they are not sufficient to address the new reality that Mythos represents.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102250</guid>
      <pubDate>Thu, 23 Apr 2026 11:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102250-operationally-ineffective-putting-cves-in-a-chokehold-with-privilege-disruption</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-with-green-code-by-Moritz-Erken.webp?t=1776868738" type="image/png" length="374989"/>
    </item>
    <item>
      <title>How Should Effective AI Red Teams Operate?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Dr. Peter Garraghan speaks with <em>Security </em>magazine about AI-specific red teaming.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102249</guid>
      <pubDate>Thu, 23 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102249-how-should-effective-ai-red-teams-operate</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/SEC_Web_5Minutes-Garraghan-0426_1170x658.webp?t=1776873919" type="image/jpeg" length="99911"/>
    </item>
    <item>
      <title>The Privacy–Security Partnership: How We Bend Risk in a Resource Crunch</title>
      <description>
        <![CDATA[<p>The partnership between cybersecurity and privacy matters now more than ever.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102216</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102216-the-privacysecurity-partnership-how-we-bend-risk-in-a-resource-crunch</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Cyber-Feat-Slide1-1170x658.webp?t=1775658579" type="image/jpeg" length="106368"/>
    </item>
    <item>
      <title>What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore </title>
      <description>
        <![CDATA[<p><em>The Pitt&nbsp;</em>may end its story with systems restored, but real hospitals don’t get that clean ending.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102236</guid>
      <pubDate>Thu, 16 Apr 2026 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102236-what-the-pitt-gets-right-about-ransomware-and-what-hospitals-cant-afford-to-ignore</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Ambulance-by-Albert-Stoynov.webp?t=1776279946" type="image/png" length="501861"/>
    </item>
    <item>
      <title>Democratized Software, Democratized Risk: Who’s Accountable When Everyone Codes?</title>
      <description>
        <![CDATA[<p>How to modernize risk management when software creation becomes broadly distributed. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102234</guid>
      <pubDate>Thu, 16 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102234-democratized-software-democratized-risk-whos-accountable-when-everyone-codes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Pink-and-orange-laptop-by-Joshua-Reddekopp.webp?t=1776268323" type="image/png" length="188461"/>
    </item>
    <item>
      <title>3 Quantum Realities to Confront this World Quantum Day</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>3 quantum realities security leaders need to confront.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102229</guid>
      <pubDate>Tue, 14 Apr 2026 08:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102229-3-quantum-realities-to-confront-this-world-quantum-day</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/13/Transparent-cube-and-colorful-squares-by-David-Clode.webp?t=1776099451" type="image/png" length="686636"/>
    </item>
    <item>
      <title>Ransomware Response: How Businesses Regain Control Under Pressure</title>
      <description>
        <![CDATA[<p>You can’t control when ransomware attacks happen, but you can control how you respond.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102212</guid>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102212-ransomware-response-how-businesses-regain-control-under-pressure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/07/Head-in-front-of-monitors-by-Kevin-Horvat.webp?t=1776276357" type="image/png" length="385769"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1776276359" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Taming the Threat Beast: Building a Threat-Led Cybersecurity Program</title>
      <description>
        <![CDATA[<p>Moving from noisy threat feeds to focused intelligence that security teams can actually act on.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102175</guid>
      <pubDate>Fri, 20 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102175-taming-the-threat-beast-building-a-threat-led-cybersecurity-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Cyber-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="198421"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Would You Trust an AI Pentester to Work Solo?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Can we trust AI to find the vulnerabilities that matter?</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102154</guid>
      <pubDate>Wed, 04 Mar 2026 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102154-would-you-trust-an-ai-pentester-to-work-solo</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Robot-and-human-hand-with-AI-background-by-Igor-Omilaev.webp?t=1773279399" type="image/png" length="437035"/>
    </item>
    <item>
      <title>Harvest Now, Decrypt Later: Preparing for the Quantum Hangover</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Quantum computing will be the next major shockwave to hit cybersecurity.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102146</guid>
      <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102146-harvest-now-decrypt-later-preparing-for-the-quantum-hangover</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/25/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773279398" type="image/png" length="373204"/>
    </item>
    <item>
      <title>The Olympics Are Going Mobile — Your Security Strategy Has to Follow</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102123</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102123-the-olympics-are-going-mobile-your-security-strategy-has-to-follow</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Person-on-iPhone-by-Onur-Binay.webp?t=1771464182" type="image/png" length="199368"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>Understanding Breaches Before and After They Happen: What Every Organization Should Know</title>
      <description>
        <![CDATA[<p>Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102121</guid>
      <pubDate>Tue, 10 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102121-understanding-breaches-before-and-after-they-happen-what-every-organization-should-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Two-open-padlocks-with-one-closed-by-FlyD.webp?t=1771464183" type="image/png" length="344327"/>
    </item>
    <item>
      <title>Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure</title>
      <description>
        <![CDATA[<p>New analysis of healthcare cyber losses suggests that foundational controls remain the most effective at reducing risk.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102112</guid>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102112-healthcare-cybersecurity-is-in-crisis-these-proven-controls-could-be-the-cure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Medical-professional-using-tablet-by-Nappy.webp?t=1770217941" type="image/png" length="458228"/>
    </item>
    <item>
      <title>Leveraging ISACA for Your CMMC Career</title>
      <description>
        <![CDATA[<p>The Cybersecurity Maturity Model Certification sets the benchmark for how DoW contractors prove cybersecurity readiness.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102105</guid>
      <pubDate>Tue, 03 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102105-leveraging-isaca-for-your-cmmc-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Cyber-Feat-Slide1-1170x658.webp?t=1770858203" type="image/jpeg" length="229204"/>
    </item>
    <item>
      <title>Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging</title>
      <description>
        <![CDATA[<p>With pure exfiltration, businesses don’t realize they’re a victim until it’s too late.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102103</guid>
      <pubDate>Mon, 02 Feb 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102103-ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/30/Abstract-rendered-coding-blocks-by-Steve-Johnson.webp?t=1769788357" type="image/png" length="481443"/>
    </item>
    <item>
      <title>Securing Trust: Why Crisis Communication is Your First Line of Defense</title>
      <description>
        <![CDATA[<p>Trust is lost in minutes during a crisis, and clear, human communication is the only way to win it back.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102099</guid>
      <pubDate>Fri, 30 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102099-securing-trust-why-crisis-communication-is-your-first-line-of-defense</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Cyber-Feat-Slide1-1170x658.webp?t=1769609318" type="image/jpeg" length="49788"/>
    </item>
    <item>
      <title>The New Battleground of Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with James Maude, Field CTO at BeyondTrust, about what believes is the new battleground of cybersecurity.&nbsp;&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102100</guid>
      <pubDate>Thu, 29 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102100-the-new-battleground-of-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/28/SEC_Web_5Minutes-Maude-0226_1170x658.webp?t=1769617497" type="image/jpeg" length="98695"/>
    </item>
    <item>
      <title>Strong Privacy Requires Strong Security — and GenAI Raises the Stakes</title>
      <description>
        <![CDATA[<p>Privacy and security are not competing disciplines; they are inseparable components of the same responsibility.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102098</guid>
      <pubDate>Wed, 28 Jan 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102098-strong-privacy-requires-strong-security-and-genai-raises-the-stakes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/27/Keys-on-yellow-background-by-Alp-Duran.webp?t=1769531813" type="image/png" length="411957"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
  </channel>
</rss>
