<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cyber Case Studies</title>
    <description>
      <![CDATA[Learn about real-world applications of cybersecurity, including how enterprise IT security leaders use cyber solutions and services to advance their risk awareness and digital preparedness.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2664-cyber-case-studies</link>
    <language>en-us</language>
    <item>
      <title>The 2 am call: Preparing for a government cyberattack</title>
      <description>
        <![CDATA[<p>Fremont County suffered a cyberattack in 2022 that took pieces of the county's law enforcement's systems offline, including communications.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100336</guid>
      <pubDate>Tue, 23 Jan 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100336-the-2-am-call-preparing-for-a-government-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/23/kenny-eliason-JXg7Yq5b1wE-unsplash.webp?t=1706021943" type="image/jpeg" length="130219"/>
    </item>
    <item>
      <title>Häfele recovers from ransomware attack with new SASE platform</title>
      <author></author>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">An international manufacturer and supplier of furniture fittings,</span><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;"> recovered from a recent ransomware attack after utilizing a single-vendor SASE platform. </span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99289</guid>
      <pubDate>Wed, 03 May 2023 10:44:37 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99289-hafele-recovers-from-ransomware-attack-with-new-sase-platform</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/04/13/ransomware-keyboard-Pixabay.webp?t=1687536780" type="image/jpeg" length="145268"/>
    </item>
    <item>
      <title>Ride-hailing company, inDrive, uses new platform to prevent fraud</title>
      <author></author>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The ride-share company is using a security platform to keep negotiations & prices transparent and dishonest & fraudulent users out of the system.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98875</guid>
      <pubDate>Fri, 03 Feb 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98875-ride-hailing-company-indrive-uses-new-platform-to-prevent-fraud</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/02/02/driving-g8a1380f0c_1920.webp?t=1675355944" type="image/jpeg" length="66363"/>
    </item>
    <item>
      <title>The Old Spaghetti Factory restaurant chain ups network &amp; physical security</title>
      <author></author>
      <description>
        <![CDATA[<p>The Old Spaghetti Factory restaurant chain decided to upgrade legacy technology with network, voice and security infrastructure from Interface Systems.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98605</guid>
      <pubDate>Thu, 10 Nov 2022 10:26:36 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98605-the-old-spaghetti-factory-restaurant-chain-ups-network-and-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/11/10/OSF.webp?t=1668097454" type="image/jpeg" length="311107"/>
    </item>
    <item>
      <title>K-8 students learn cybersecurity through gamification</title>
      <author></author>
      <description>
        <![CDATA[<p>K-8 students can learn cybersecurity techniques through a gamified education platform called Cyber Legends. Learn more in this case study.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98514</guid>
      <pubDate>Mon, 24 Oct 2022 11:09:27 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98514-k-8-students-learn-cybersecurity-through-gamification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/10/24/girl-geac69840b_1920.webp?t=1666627651" type="image/jpeg" length="247431"/>
    </item>
    <item>
      <title>Electric company uses SAP monitoring to bolster cybersecurity</title>
      <author></author>
      <description>
        <![CDATA[<p>International electric and manufacturing firm Schneider Electric uses a Systems Applications and Products (SAP) security platform from SecurityBridge to bolster SAP visibility. Learn more in this case study.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98015</guid>
      <pubDate>Tue, 19 Jul 2022 09:29:08 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98015-electric-company-uses-sap-monitoring-to-bolster-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/07/19/desk-g68121a270_1920.webp?t=1658240875" type="image/jpeg" length="235100"/>
    </item>
    <item>
      <title>Pharmaceutical company secures network with AppSec compliance tools</title>
      <author></author>
      <description>
        <![CDATA[<p>Sanofi, a global <span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">biopharmaceutical company based in France, protects its network security with the Security Platform & Compliance Monitor from SecurityBridge. Learn more in this case study.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97878</guid>
      <pubDate>Fri, 24 Jun 2022 10:20:42 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97878-pharmaceutical-company-secures-network-with-appsec-compliance-tools</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/06/24/pills-g7d8b50feb_1920.webp?t=1656084071" type="image/jpeg" length="134198"/>
    </item>
    <item>
      <title>Tech university stops cyberattack with AI</title>
      <author></author>
      <description>
        <![CDATA[<p>When an African technology university was targeted by Malware as a Service, Darktrace AI helped identify the cyberattack in its early stages.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97607</guid>
      <pubDate>Thu, 12 May 2022 09:55:49 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97607-tech-university-stops-cyberattack-with-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/05/12/stillness-inmotion-Gq3i2dnLGik-unsplash-(1).webp?t=1652367299" type="image/jpeg" length="126379"/>
    </item>
    <item>
      <title>Coding robot teaches K-12 students about cybersecurity</title>
      <description>
        <![CDATA[<p>K-12 students need to learn about cybersecurity along with their exposure to digital technology. The Sphero BOLT, a coding robot, can help teach students about cyber risk management, ethical hacking and more.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97545</guid>
      <pubDate>Wed, 04 May 2022 10:23:06 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97545-coding-robot-teaches-k-12-students-about-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/05/04/jeswin-thomas-FIxxQDwpJ2g-unsplash.webp?t=1651677377" type="image/jpeg" length="235042"/>
    </item>
    <item>
      <title>Anti-human trafficking organization combats abuse with data analytics</title>
      <description>
        <![CDATA[<p>The Anti-Human Trafficking Intelligence Initiative (ATII) uses data analytics tools to monitor the dark web for information on human trafficking operations. The organization now uses Siren's Investigative Intelligence platform to expedite their search capacity.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97112</guid>
      <pubDate>Fri, 18 Feb 2022 10:58:08 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/97112-anti-human-trafficking-organization-combats-abuse-with-data-analytics</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/02/18/matrix-g68354f38b_1920.webp?t=1645203311" type="image/jpeg" length="428115"/>
    </item>
    <item>
      <title>Behavioral psychology training reduces cybersecurity risks</title>
      <description>
        <![CDATA[<p>In an effort to close the gap between technology and human error, companies are leveraging personalized cybersecurity training to reduce costly breaches.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97093</guid>
      <pubDate>Wed, 16 Feb 2022 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/97093-behavioral-psychology-training-reduces-cybersecurity-risks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/02/15/campaign-creators-gMsnXqILjp4-unsplash-(1).webp?t=1644953777" type="image/jpeg" length="264899"/>
    </item>
    <item>
      <title>Cybersecurity institute trains Texas cyber talent</title>
      <description>
        <![CDATA[<p>The North East Independent School
 District in San Antonio, Texas (NEISD)'s Institute of CyberSecurity and Innovation (iCSI) has created new opportunities for students interested in entering the cyber field.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96958</guid>
      <pubDate>Fri, 21 Jan 2022 11:45:46 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96958-cybersecurity-institute-trains-texas-cyber-talent</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2022/01/21/NEISD-Cyber-Training-Room-1.webp?t=1642786748" type="image/jpeg" length="261219"/>
    </item>
    <item>
      <title>Metropolitan school system blocks threats with cybersecurity platform</title>
      <description>
        <![CDATA[<p>A large K-12 school system implemented a cybersecurity platform from CloudCover to mitigate cyber risk.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96600</guid>
      <pubDate>Fri, 26 Nov 2021 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96600-metropolitan-school-system-blocks-threats-with-cybersecurity-platform</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/11/24/girl-g7e02c0734_1920.webp?t=1637787508" type="image/jpeg" length="334207"/>
    </item>
    <item>
      <title>Minnesota IT Services bolsters cloud security</title>
      <description>
        <![CDATA[<p>Minnesota IT Services, the state cybersecurity and information technology agency, added cloud protection from Radware to better serve the Minnesota community. Read more about the solution in this case study.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96542</guid>
      <pubDate>Wed, 17 Nov 2021 09:41:41 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96542-minnesota-it-services-bolsters-cloud-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/11/17/capitol-building-gedc342f1b_1920.webp?t=1637163690" type="image/jpeg" length="402365"/>
    </item>
    <item>
      <title>Data access strategy helps hotels on- and offboard employees</title>
      <description>
        <![CDATA[<p>Village Hotels, a hotel group with over 30 locations across the United Kingdom, has implemented a data management solution from CloudM to help on- and offboard employees. Read more about the solution in this case study.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96535</guid>
      <pubDate>Tue, 16 Nov 2021 11:53:16 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96535-data-access-strategy-helps-hotels-on-and-offboard-employees</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/11/16/louis-hansel-wVoP_Q2Bg_A-unsplash.webp?t=1637085154" type="image/jpeg" length="378711"/>
    </item>
    <item>
      <title>Account compromises may decrease by 96% at Florida State</title>
      <description>
        <![CDATA[<p>After implementing a two-factor authentication program, Florida State University projects account compromises to decrease by 96% in 2021.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96497</guid>
      <pubDate>Wed, 10 Nov 2021 08:37:22 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96497-account-compromises-may-decrease-by-96-at-florida-state</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/11/10/fsu-gae07805b7_1920.webp?t=1636554956" type="image/jpeg" length="471593"/>
    </item>
    <item>
      <title>San Diego prioritizes IT department security</title>
      <description>
        <![CDATA[<p>The city will upgrade its IT department security with cloud support and end-user protections for its employees, many of whom work remotely due to the COVID-19 pandemic.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96153</guid>
      <pubDate>Wed, 22 Sep 2021 12:02:56 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/96153-san-diego-prioritizes-it-department-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/09/22/san-diego-skyline-4353504_1920.webp?t=1632330156" type="image/jpeg" length="554101"/>
    </item>
    <item>
      <title>What the Kaseya attack can teach local governments about preventing third-party data breaches </title>
      <description>
        <![CDATA[<p><span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Tony Bryson, C<span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">hief Information Security Officer for the Town of Gilbert, Ariz.,</span>
scaled the town's cybersecurity defenses by adopting a preventative solution through a  third-party security company to</span><span style="color: rgb(14, 16, 26); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;"> help to mitigate the risks associated with supply chain attacks.
</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96095</guid>
      <pubDate>Wed, 15 Sep 2021 09:26:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/96095-what-the-kaseya-attack-can-teach-local-governments-about-preventing-third-party-data-breaches</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/hacking-freepik.webp?t=1623251337" type="image/jpeg" length="188923"/>
    </item>
    <item>
      <title>Notorious cybersecurity attacks in history and how to prevent them</title>
      <author></author>
      <description>
        <![CDATA[<p>When it comes to cybersecurity, companies still have a lot of work to do to find ways to anticipate and avoid data breaches. Let&rsquo;s take a look at a few of the most notorious cybersecurity attacks that have happened over the last few decades and see what you and your enterprise can learn.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94114</guid>
      <pubDate>Wed, 27 Jan 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/94114-notorious-cybersecurity-attacks-in-history-and-how-to-prevent-them</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/maze-1804499_1920.webp?t=1607362969" type="image/jpeg" length="75847"/>
    </item>
    <item>
      <title>Disinformation: Companies in the crosshairs</title>
      <description>
        <![CDATA[<p>The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in a company&#39;s&nbsp;risk preparedness contingency planning.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94020</guid>
      <pubDate>Tue, 12 Jan 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/94020-disinformation-companies-in-the-crosshairs</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/face-4908263_1280.webp?t=1606241791" type="image/png" length="580401"/>
    </item>
    <item>
      <title>A first-hand account of ransomware: To pay or not to pay</title>
      <author></author>
      <description>
        <![CDATA[<p>The author discusses his company&rsquo;s first-hand account of ransomware that hit the organization and how they navigated this difficult situation that many enterprises have found themselves in.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/94180</guid>
      <pubDate>Thu, 17 Dec 2020 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/94180-a-first-hand-account-of-ransomware-to-pay-or-not-to-pay</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/cyber-4747177_1920.webp?t=1608150315" type="image/jpeg" length="179972"/>
    </item>
    <item>
      <title>Port of Los Angeles to secure its supply chain with a Cyber Resilience Center</title>
      <description>
        <![CDATA[<p>The Port of Los Angeles is creating a&nbsp;Port Cyber Resilience Center (CRC) that will help protect the organization&#39;s supply chain from cyber-related breaches.&nbsp;The CRC will be a maritime Security Intelligence and Operations Center (SIOC) to automate threat collaboration and extend its reach beyond traditional maritime stakeholders to Port stakeholders that are more broadly involved in cargo flow, such cross-sector companies.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94172</guid>
      <pubDate>Wed, 16 Dec 2020 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/94172-port-of-los-angeles-to-secure-its-supply-chain-with-a-cyber-resilience-center</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/dock-441989_1920.webp?t=1608070493" type="image/jpeg" length="191838"/>
    </item>
    <item>
      <title>Commercial construction company Webcor implements managed services to improve its security posture</title>
      <description>
        <![CDATA[<p>Webcor, a&nbsp;provider of commercial construction services throughout California needed a way to&nbsp;find and mitigate threats, and reduce the company&rsquo;s cyber risk profile. The company implemented a managed services approach to augment its existing IT and security staff and improve its security posture.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94023</guid>
      <pubDate>Thu, 26 Nov 2020 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/94023-commercial-construction-company-webcor-implements-managed-services-to-improve-its-security-posture</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/construction-2578410_1920-1.webp?t=1606250851" type="image/jpeg" length="193056"/>
    </item>
    <item>
      <title>Eliminating vulnerabilities early in the SDLC for Société Française du Radiotelephone</title>
      <description>
        <![CDATA[<p>Altice Europe, a leading player in the convergence between telecom and media in France, services&nbsp;23 million customers through its SFR division&mdash;Soci&eacute;t&eacute; fran&ccedil;aise du radiotelephone&mdash;providing voice, video, data, internet telecommunications and professional services to consumers and businesses.&nbsp;The business-to-consumer (B2C) IT division of SFR deploys dozens of major projects each year, including web, front-end, and office applications.&nbsp;</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/93112</guid>
      <pubDate>Wed, 19 Aug 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/93112-eliminating-vulnerabilities-early-in-the-sdlc-for-soci%C3%A9t%C3%A9-fran%C3%A7aise-du-radiotelephone</link>
    </item>
    <item>
      <title>DefenTec deploys KeeperMSP to defend from cyberattacks</title>
      <description>
        <![CDATA[<p>DefenTec began as a managed services provider (MSP) before transitioning into a managed security services provider (MSSP). Now, in addition to optimizing their clients&rsquo; data environments through managed services, IT support and consulting, and cloud computing, DefenTec also fortifies them through a full range of managed security services, including secure Wi-Fidesign, network audits, and of course, password management. How does DefenTec use KeeperMSP to further guard their clients from cyberattacks?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/93051</guid>
      <pubDate>Wed, 12 Aug 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/93051-defentec-deploys-keepermsp-to-defend-from-cyberattacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/cyber-2.webp?t=1597163395" type="image/jpeg" length="283866"/>
    </item>
    <item>
      <title>EL AL Airlines: Integrating Security into CI/CD with Seeker IAST from Synopsys</title>
      <description>
        <![CDATA[EL AL Israel Airlines Ltd. has over 6,000 employees and is the national air carrier of Israel, carrying over 5.5 million passengers a year. EL AL faces cyberthreats on a regular basis and must maintain the highest levels of application security to prevent these threats from endangering the privacy and safety of its passengers.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/92264</guid>
      <pubDate>Wed, 29 Apr 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/92264-el-al-airlines-integrating-security-into-cicd-with-seeker-iast-from-synopsys</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/airplane.webp?t=1588172726" type="image/jpeg" length="498126"/>
    </item>
    <item>
      <title>Cybersecurity at Val Verde ISD</title>
      <description>
        <![CDATA[<p>How does the team at the Val Verde ISD protect the data of its students, faculty and staff?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91855</guid>
      <pubDate>Wed, 11 Mar 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91855-cybersecurity-at-val-verde-isd</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2020/March/SEC0320-val-feat-slide1_900px.webp?t=1596116382" type="image/jpeg" length="65707"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2020/March/SEC0320-val-feat-slide1_900px.webp?t=1596116382" type="image/jpeg" medium="image" fileSize="65707">
        <media:title type="plain">SEC0320-val-feat-slide1_900px.jpg</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2020/March/SEC0320-val-slide2_900px.webp?t=1583510030" type="image/jpeg" medium="image" fileSize="81925">
        <media:title type="plain">SEC0320-val-slide2_900px.jpg</media:title>
        <media:description type="plain">The mission of Val Verde Unified School District is to provide academic environments that produce life-long learners who become responsible and contributing citizens in a culturally diverse society.

Photo courtesy of the Val Verde Unified School District
</media:description>
      </media:content>
    </item>
    <item>
      <title>Safeguarding Security and Loss Prevention at Gap Inc.</title>
      <description>
        <![CDATA[<p>How does Keith White, EVP of Loss Prevention at Gap, Inc., manage security across a vast enterprise?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90477</guid>
      <pubDate>Wed, 03 Jul 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90477-safeguarding-security-and-loss-prevention-at-gap-inc</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/July/SEC0719-Profile-Feat-slide1_900px.webp?t=1562096386" type="image/jpeg" length="43958"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/July/SEC0719-Profile-Feat-slide1_900px.webp?t=1562096386" type="image/jpeg" medium="image" fileSize="43958">
        <media:title type="plain">SEC0719-Profile-Feat-slide1_900px</media:title>
        <media:description type="plain">“What’s been bubbling up to the top lately is the aggressive behavior and the brazenness of potential thieves,” says Keith White, Division Executive Vice President of Loss Prevention &amp;amp; Global Sustainability at Gap Inc. “They seem to steal with a certain amount of disregard for the safety of others and the safety of themselves, whether they’re being very boisterous in a profane way or they’re being aggressive in a physical way. That’s something I think every retailer has seen in some way.”

Photo courtesy of Gap  Inc.
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/July/SEC0719-Profile-slide2_900px.webp?t=1562097084" type="image/jpeg" medium="image" fileSize="109689">
        <media:title type="plain">SEC0719-Profile-slide2_900px</media:title>
        <media:description type="plain">Gap store managers and LP team members are trained to log security incidents and they are given tools to do this simply and efficiently, filing reports from the sales floor via cash register or mobile device.

Photo courtesy of Gap  Inc.
</media:description>
      </media:content>
    </item>
    <item>
      <title>When Physical Intrusions Lead to Digital Breaches</title>
      <author>edfinkel@earthlink.net (Ed Finkel)</author>
      <description>
        <![CDATA[<p>Healthcare institutions lock down access through proper ID management and employee training.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90089</guid>
      <pubDate>Thu, 04 Apr 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90089-when-physical-intrusions-lead-to-digital-breaches</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-IDmgmt-feat-slide1_900px.webp?t=1554399680" type="image/jpeg" length="26828"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-IDmgmt-feat-slide1_900px.webp?t=1554399680" type="image/jpeg" medium="image" fileSize="26828">
        <media:title type="plain">SEC0419-IDmgmt-feat-slide1_900px</media:title>
        <media:description type="plain">There are numerous cases in which people lacking an ID badge find their way into facilities through stealth, or charm. Such social engineering attempts, known as “tailgating,” can be very challenging to deal with in the healthcare sector, in particular.
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-IDmgmt-slide2_900px.webp?t=1554399758" type="image/jpeg" medium="image" fileSize="42728">
        <media:title type="plain">SEC0419-IDmgmt-slide2_900px</media:title>
        <media:description type="plain">Memorial Memorial Healthcare in Owosso, Mich., has been continuously adding to its camera surveillance footprint to help identify suspicious activity like someone who might be using a stolen or misplaced badge.

Photo courtesy of Memorial Healthcare
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-IDmgmt-slide3_900px.webp?t=1554399782" type="image/jpeg" medium="image" fileSize="107524">
        <media:title type="plain">SEC0419-IDmgmt-slide3_900px</media:title>
        <media:description type="plain">Security officers in hospitals and healthcare facilities need to be trained to recognize phony badges in systems where they’re visual only.
</media:description>
      </media:content>
    </item>
    <item>
      <title>How Unified Device Management Is Critical to BYOD Enterprises</title>
      <description>
        <![CDATA[<p>
	&nbsp;Eight months: That&rsquo;s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don&rsquo;t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.&nbsp;&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/85876</guid>
      <pubDate>Sat, 01 Nov 2014 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/85876-how-unified-device-management-is-critical-to-byod-enterprises</link>
    </item>
  </channel>
</rss>
