<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Government: Federal, State and Local</title>
    <description>
      <![CDATA[Managing regulation and addressing security risks in government capacities requires constant vigilance.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2645</link>
    <language>en-us</language>
    <item>
      <title>Security Leaders Share Thoughts on Foster City Cyberattack</title>
      <description>
        <![CDATA[<p>A ransomware attack on Foster City, California, triggered a state of emergency to access additional resources to keep systems up and running.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102196</guid>
      <pubDate>Tue, 24 Mar 2026 13:52:05 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102196-security-leaders-share-thoughts-on-foster-city-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/24/ilya-pavlov-OqtafYT5kTw-unsplash-(8).webp?t=1774374543" type="image/jpeg" length="136420"/>
    </item>
    <item>
      <title>The FBI Buys Data to Track Movement, Location History</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Director Patel stated the FBI purchases data that can be leveraged to track a person’s movement and location history.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102189</guid>
      <pubDate>Fri, 20 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102189-the-fbi-buys-data-to-track-movement-location-history</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Person-placing-location-pin-on-map-by-GeoJango-Maps.webp?t=1773946101" type="image/png" length="393550"/>
    </item>
    <item>
      <title>Trump’s Former Counter-Terrorism Official Investigated Over Alleged Leaks</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Joe Kent is under investigation for alleged leaks of classified information</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102187</guid>
      <pubDate>Thu, 19 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102187-trumps-former-counter-terrorism-official-investigated-over-alleged-leaks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/FBI-emblem-by-David-Trinks.webp?t=1773924947" type="image/png" length="818037"/>
    </item>
    <item>
      <title>Stryker Update: FBI Seizes Website of Iran-Linked Hackers</title>
      <author></author>
      <description>
        <![CDATA[<p>The FBI has seized the website of the Iranian-linked hackers believed to be behind the recent cyberattack against Stryker.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102190</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102190-stryker-update-fbi-seizes-website-of-iran-linked-hackers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Computer-with-binary-code-hovering-nearby-by-Steve-Johnson.webp?t=1773948437" type="image/png" length="376534"/>
    </item>
    <item>
      <title>Security Team Member Dies in Standoff with Dallas Police</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A member of Democratic U.S. Rep. Jasmine Crockett’s security team was killed in a standoff with the Dallas police.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102179</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102179-security-team-member-dies-in-standoff-with-dallas-police</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Police-lights-by-Max-Fleischmann.webp?t=1773757343" type="image/png" length="471259"/>
    </item>
    <item>
      <title>Security Leaders Discuss Trump’s Cyber Strategy for America</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders share approval and critiques of Trump’s Cyber Strategy for America.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102166</guid>
      <pubDate>Tue, 10 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102166-security-leaders-discuss-trumps-cyber-strategy-for-america</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/10/American-flag-by-Laura-Seaman.webp?t=1773279400" type="image/png" length="407086"/>
    </item>
    <item>
      <title>Airport Security Challenges in the Midst of the DHS Shutdown</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>TSA is facing challenges due to the DHS shutdown.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102164</guid>
      <pubDate>Mon, 09 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102164-airport-security-challenges-in-the-midst-of-the-dhs-shutdown</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Airport-baggage-check-by-Phil-Mosley.webp?t=1773066755" type="image/png" length="593724"/>
    </item>
    <item>
      <title>Shawn Fallah — Top Cybersecurity Leaders 2026</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Shawn Fallah shares his four key qualities for success in cybersecurity.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102135</guid>
      <pubDate>Tue, 03 Mar 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102135-shawn-fallah-top-cybersecurity-leaders-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-TCL-Feat-Fallah-Slide1-1170x658.webp?t=1772642386" type="image/jpeg" length="110714"/>
    </item>
    <item>
      <title>Montana National Guard Appoints First Ever Cyber Warfare Officer</title>
      <author></author>
      <description>
        <![CDATA[<p>This appointment aims to improve of the <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">state’s&nbsp;</span>proactive cyber defense capabilities.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102148</guid>
      <pubDate>Fri, 27 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102148-montana-national-guard-appoints-first-ever-cyber-warfare-officer</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/26/Montana-capitol-by-Steven-Cordes.webp?t=1772123947" type="image/png" length="573262"/>
    </item>
    <item>
      <title>DHS Shutdown to Begin Saturday, February 14</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Funding for the Department of Homeland Security (DHS) will expire at 12 am on Saturday, February 14th.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102125</guid>
      <pubDate>Fri, 13 Feb 2026 13:00:34 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102125-dhs-shutdown-to-begin-saturday-february-14</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/luke-michael-Tdwu35bCUj0-unsplash.webp?t=1772041698" type="image/jpeg" length="118039"/>
    </item>
    <item>
      <title>Epstein File Data Security Update: Raw Code Found in Emails</title>
      <author></author>
      <description>
        <![CDATA[<p>Reports suggest&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">raw email data was found in select Epstein files.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102120</guid>
      <pubDate>Fri, 06 Feb 2026 12:10:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102120-epstein-file-data-security-update-raw-code-found-in-emails</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/06/Coding-by-Markus-Spiske.webp?t=1770858202" type="image/png" length="633360"/>
    </item>
    <item>
      <title>Epstein Files Leak Sensitive Data, Victim Information and Credentials</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Thousands of records released in relation to Jeffrey Epstein have been retracted due to<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">&nbsp;inadequate redactions.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102113</guid>
      <pubDate>Wed, 04 Feb 2026 11:45:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102113-epstein-files-leak-sensitive-data-victim-information-and-credentials</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Digital-cursor-by-Liam-Briese.webp?t=1770223099" type="image/png" length="11157"/>
    </item>
    <item>
      <title>Privilege Disruption: The Key Choke Point for Cyber Deterrence</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The government and private sector alike must recognize the importance of privilege disruption.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102111</guid>
      <pubDate>Wed, 04 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102111-privilege-disruption-the-key-choke-point-for-cyber-deterrence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/03/Computer-and-laptop-by-Mamur-Saitbaev.webp?t=1770144049" type="image/png" length="235318"/>
    </item>
    <item>
      <title>Is Renewing CISA Enough to Restore Confidence for Cyber Threat Reporters?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Stop-and-go authorizations undermine real-time threat sharing.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102102</guid>
      <pubDate>Fri, 30 Jan 2026 10:25:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102102-is-renewing-cisa-enough-to-restore-confidence-for-cyber-threat-reporters</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/30/United-States-capitol-by-Louis-Velazquez.webp?t=1769785683" type="image/png" length="590390"/>
    </item>
    <item>
      <title>Two Unique DHS Cyber Incidents Exposed 1M People’s Data</title>
      <author></author>
      <description>
        <![CDATA[<p>Within two weeks of each other, two separate states have announced data security incidents. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102089</guid>
      <pubDate>Wed, 21 Jan 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102089-two-unique-dhs-cyber-incidents-exposed-1m-peoples-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/21/Opened-padlock-on-computer-keyboard-by-Sasun-Bughdaryan.webp?t=1769013545" type="image/png" length="307414"/>
    </item>
    <item>
      <title>With New AI Executive Order, Security Burdens Shift to Users And Organizations</title>
      <description>
        <![CDATA[<p>Preparing for the future of AI regulation.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102079</guid>
      <pubDate>Mon, 19 Jan 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102079-with-new-ai-executive-order-security-burdens-shift-to-users-and-organizations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/16/Conference-room-by-Campaign-Creators.webp?t=1769044795" type="image/png" length="529219"/>
    </item>
    <item>
      <title>This Website Exposed ICE Data — Now, It’s Faced a Cyberattack</title>
      <author></author>
      <description>
        <![CDATA[<p>ICE experienced a breach of personally identifiable information.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102078</guid>
      <pubDate>Thu, 15 Jan 2026 11:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102078-this-website-exposed-ice-data-now-its-faced-a-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/15/Coding-on-screen-by-Shahadat-Rahman.webp?t=1769044795" type="image/png" length="299450"/>
    </item>
    <item>
      <title>Trump Administration Issues New AI Executive Order </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How should organizations respond to the new AI executive order?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102047</guid>
      <pubDate>Mon, 15 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102047-trump-administration-issues-new-ai-executive-order</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/12/The-White-House-by-Tomasz-Zielonka.webp?t=1767627541" type="image/png" length="482477"/>
    </item>
    <item>
      <title>High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management</title>
      <description>
        <![CDATA[<p>Breaking down protection guidance for the water and wastewater industry.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102018</guid>
      <pubDate>Fri, 28 Nov 2025 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102018-high-water-mark-cisa-shares-foundations-for-effective-cybersecurity-and-risk-management</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/21/Water-faucet-and-cup-by-LuAnn-Hunt.webp?t=1764812377" type="image/png" length="371076"/>
    </item>
    <item>
      <title>FCC Terminates Telecom Cyber Rules Enacted After Salt Typhoon Exploit</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>The FCC has chosen to end the telecommunications cyber rules enacted after the Salt Typhoon espionage campaign. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102017</guid>
      <pubDate>Mon, 24 Nov 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102017-fcc-terminates-telecom-cyber-rules-enacted-after-salt-typhoon-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/21/Red-rotary-phone-by-Miryam-Len.webp?t=1763744622" type="image/png" length="335343"/>
    </item>
    <item>
      <title>Vice President Dick Cheney Passes Away at Age 84</title>
      <description>
        <![CDATA[<p>Former Vice President Dick Cheney passed away at age 84 on November 3, 2025 with a public announcement on November 4, 2025.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101992</guid>
      <pubDate>Tue, 04 Nov 2025 09:24:25 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101992-vice-president-dick-cheney-passes-away-at-age-84</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/04/charles-duck-unitas-hPq1nLfLgBY-unsplash.webp?t=1762266065" type="image/jpeg" length="139469"/>
    </item>
    <item>
      <title>Federal Workers Union Calls for an End to the Shutdown</title>
      <description>
        <![CDATA[]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101976</guid>
      <pubDate>Mon, 27 Oct 2025 11:42:26 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101976-federal-workers-union-calls-for-an-end-to-the-shutdown</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/27/seo-galaxy-yusHnkBhF3Q-unsplash.webp?t=1761578137" type="image/jpeg" length="97357"/>
    </item>
    <item>
      <title>Don’t Wait, Advocate: K-12 Cybersecurity Needs Our Help</title>
      <description>
        <![CDATA[<p>Losing CISA 2015 means losing protections that enable schools to safely and legally share data and threat intelligence.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101961</guid>
      <pubDate>Thu, 16 Oct 2025 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101961-dont-wait-advocate-k-12-cybersecurity-needs-our-help</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/15/Empty-classroom-by-Feliphe-Schiarolli.webp?t=1760538013" type="image/png" length="421626"/>
    </item>
    <item>
      <title>US Government Shutdown Begins October 1, 2025</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The U.S. government has shut down as of 12:01 am on October 1, 2025.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101951</guid>
      <pubDate>Wed, 01 Oct 2025 11:02:48 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101951-us-government-shutdown-begins-october-1-2025</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/01/brett-jordan-ZoZJLgAIvGc-unsplash-(1).webp?t=1761294785" type="image/jpeg" length="110679"/>
    </item>
    <item>
      <title>Sensitive Intel Exposed: DHS Data Hub Accessible to Thousands</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>A data hub for the DHS exposed sensitive information.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101921</guid>
      <pubDate>Mon, 22 Sep 2025 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101921-sensitive-intel-exposed-dhs-data-hub-accessible-to-thousands</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/19/Green-code-by-Jake-Walker.webp?t=1759369888" type="image/png" length="576350"/>
    </item>
    <item>
      <title>CISA 2015 Closes in on Expiration, Security Leaders Share Concerns</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>What happens if the Cybersecurity Information Sharing Act of 2015 expires? Security leaders share their concerns.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101918</guid>
      <pubDate>Fri, 19 Sep 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101918-cisa-2015-closes-in-on-expiration-security-leaders-share-concerns</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/18/Old-computers-in-dark-building-by-Artem-Gilmutdinov.webp?t=1758208818" type="image/png" length="246745"/>
    </item>
    <item>
      <title>U.S. Senator Calls for Investigation of Microsoft</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">U.S. Senator Ron Wyden (D-OR) has called for an investigation of Microsoft, claiming the company’s insecure software has enabled cyber threats. &nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101908</guid>
      <pubDate>Tue, 16 Sep 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101908-us-senator-calls-for-investigation-of-microsoft</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/15/Magnifying-glass-over-laptop-by-Agence-Olloweb.webp?t=1757948296" type="image/png" length="332543"/>
    </item>
    <item>
      <title>Charlie Kirk’s Shooting Exposes Event Security Gaps, Increasing Political Violence Threat</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The shooting of Charlie Kirk reveals concerning realities about event security and political violence.&nbsp;</span></p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101907</guid>
      <pubDate>Fri, 12 Sep 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101907-charlie-kirks-shooting-exposes-event-security-gaps-increasing-political-violence-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/12/Dark-and-torn-American-flag-by-Tim-Mossholder.webp?t=1757689579" type="image/png" length="324651"/>
    </item>
    <item>
      <title>Critical Steps to Strengthening Satellite Network Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Satellite networks are integral to myriad aspects of modern society, providing essential services that support both civilian and military operations.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101898</guid>
      <pubDate>Thu, 11 Sep 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101898-critical-steps-to-strengthening-satellite-network-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/10/nasa-8Hjx3GNZYeA-unsplash.webp?t=1757513334" type="image/jpeg" length="118256"/>
    </item>
    <item>
      <title>Public and Private Collaboration Can Help Bolster our Cyber-Posture</title>
      <description>
        <![CDATA[<p>Through collaboration, security leaders can address fragmented approaches to cybersecurity within the U.S.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101878</guid>
      <pubDate>Fri, 05 Sep 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101878-public-and-private-collaboration-can-help-bolster-our-cyber-posture</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/09-September/SEC-0925-F2-Feat-Slide1-1170x658.webp?t=1756838044" type="image/jpeg" length="154767"/>
    </item>
  </channel>
</rss>
