<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cybersecurity Education &amp; Training</title>
    <description>
      <![CDATA[Focusing on cybersecurity, this column covers essential topics for CISOs, including cyber leadership, infosec best practices, pentesting, red teaming, zero trust, threat assessments, data security and privacy, insider threats and more.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2991</link>
    <language>en-us</language>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>The Prevention Partnership: Executive Protection &amp; Behavioral Threat Teams</title>
      <description>
        <![CDATA[<p>Real protection starts long before the threat gets close, and that’s where the other half of the equation comes in.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101945</guid>
      <pubDate>Wed, 08 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101945-the-prevention-partnership-executive-protection-and-behavioral-threat-teams</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-Edu-Feat-Slide1-1170x658.webp?t=1759851730" type="image/jpeg" length="70684"/>
    </item>
    <item>
      <title>Preventing Workplace Violence: A Strategic Imperative for Today’s Organizations</title>
      <description>
        <![CDATA[<p>Alan Saquella, CPP, outlines how to build an effective workplace violence strategy.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101884</guid>
      <pubDate>Mon, 08 Sep 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101884-preventing-workplace-violence-a-strategic-imperative-for-todays-organizations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/09-September/SEC-0925-Edu-Feat-Slide1-1170x658.webp?t=1757002289" type="image/jpeg" length="92714"/>
    </item>
    <item>
      <title>Why Everyone Should Be Trained in De-Escalation</title>
      <description>
        <![CDATA[<p>De-escalation is a valuable tool for teachers, front desk professionals, managers, and just about anyone that works with others.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101803</guid>
      <pubDate>Fri, 08 Aug 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101803-why-everyone-should-be-trained-in-de-escalation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/08-August/SEC-0825-Edu-Feat-Slide1-1170x658.webp?t=1755104663" type="image/jpeg" length="53170"/>
    </item>
    <item>
      <title>Preventing Burnout in The Security Industry</title>
      <description>
        <![CDATA[<p>Burnout can happen at any level of an organization, especially in a fast-paced environment like security.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101600</guid>
      <pubDate>Wed, 07 May 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101600-preventing-burnout-in-the-security-industry</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/05-May/SEC-0525-Edu-Feat-Slide1-1170x658.webp?t=1746458486" type="image/jpeg" length="61887"/>
    </item>
    <item>
      <title>Active shooter preparedness: Past, present and future</title>
      <description>
        <![CDATA[<p>Security leader discusses what can be learned from past active shooter incidents.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101107</guid>
      <pubDate>Thu, 10 Oct 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101107-active-shooter-preparedness-past-present-and-future</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/10-October/SEC-1024-Edu-Feat-Slide1-1170x658.webp?t=1728731744" type="image/jpeg" length="60164"/>
    </item>
    <item>
      <title>The multi-faceted threat of domestic terrorism</title>
      <description>
        <![CDATA[<p>Security leaders should pay close attention to evolving threats as domestic terrorism attacks rise.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100912</guid>
      <pubDate>Thu, 08 Aug 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100912-the-multi-faceted-threat-of-domestic-terrorism</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/08-August/SEC-0824-Edu-Feat-Slide1-1170x658.webp?t=1722545311" type="image/jpeg" length="200955"/>
    </item>
    <item>
      <title>How military-civilian cooperation is transforming space cybersecurity</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Over the past decade, there has been a proliferation of space-based technology — and cybersecurity threats.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100329</guid>
      <pubDate>Fri, 01 Mar 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100329-how-military-civilian-cooperation-is-transforming-space-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/24/nasa-yZygONrUBe8-unsplash.webp?t=1709660923" type="image/jpeg" length="325104"/>
    </item>
    <item>
      <title>The pros and cons for AI in financial sector cybersecurity</title>
      <description>
        <![CDATA[<p>The financial sector has been deeply impacted by fraud, and security professionals are finding ways to mitigate it via artificial intelligence (AI).</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100328</guid>
      <pubDate>Thu, 01 Feb 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100328-the-pros-and-cons-for-ai-in-financial-sector-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/24/etienne-martin-2_K82gx9Uk8-unsplash-(1).webp?t=1706890251" type="image/jpeg" length="313556"/>
    </item>
    <item>
      <title>False positives: Mitigating concerns from cybersecurity-minded users</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">As new security risks emerge daily and the tech landscape shifts, false positives are here to stay. Security teams can use data to manage cyber risk.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100273</guid>
      <pubDate>Tue, 09 Jan 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100273-false-positives-mitigating-concerns-from-cybersecurity-minded-users</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/08/cyber-alert-(1).webp?t=1706290395" type="image/png" length="580418"/>
    </item>
    <item>
      <title>Transforming retail security and efficiency with video management</title>
      <description>
        <![CDATA[<p>Enterprise security executives can harness the power of VMS to optimize operations in the retail sector.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100215</guid>
      <pubDate>Tue, 12 Dec 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100215-transforming-retail-security-and-efficiency-with-video-management</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/December/SEC-1223-Edu-Feat-Slide1-1170x658.webp?t=1703277511" type="image/jpeg" length="114641"/>
    </item>
    <item>
      <title>Navigating CISOs' top 4 challenges</title>
      <description>
        <![CDATA[<p>Let’s take a closer look at what is top of mind for the CISO community and what strategies they can implement to address concerns moving into 2024.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100116</guid>
      <pubDate>Fri, 01 Dec 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100116-navigating-cisos-top-4-challenges</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/11/07/christina-wocintechchat-com-p5_X4pYtFn4-unsplash.webp?t=1699387025" type="image/jpeg" length="235114"/>
    </item>
    <item>
      <title>How to keep top cybersecurity talent and attract even more</title>
      <description>
        <![CDATA[<p>How can organizational leaders both encourage their cybersecurity staff to stay with them and attract new talent to manage the rising number of breaches and attacks on businesses?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99946</guid>
      <pubDate>Wed, 01 Nov 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99946-how-to-keep-top-cybersecurity-talent-and-attract-even-more</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/10/09/Cyber-talent.webp?t=1696872053" type="image/jpeg" length="200728"/>
    </item>
    <item>
      <title>Protecting enterprise data — wherever it lives</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">It's no longer enough to manage structured data. Enterprise security teams need to control access to all data — no matter where it lives.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99844</guid>
      <pubDate>Mon, 02 Oct 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99844-protecting-enterprise-data-wherever-it-lives</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/09/05/data.webp?t=1696616056" type="image/jpeg" length="618850"/>
    </item>
    <item>
      <title>Embracing a company culture of cybersecurity starts at the top</title>
      <description>
        <![CDATA[<p>A strong enterprise cybersecurity program requires leadership buy-in — and a new look at how we have traditionally secured digital environments.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99573</guid>
      <pubDate>Mon, 04 Sep 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99573-embracing-a-company-culture-of-cybersecurity-starts-at-the-top</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/08/01/bruce-mars-GzumspFznSE-unsplash.webp?t=1695998902" type="image/jpeg" length="263411"/>
    </item>
    <item>
      <title>Assessing the pros and cons of AI for cybersecurity</title>
      <description>
        <![CDATA[<p>Artificial intelligence (AI) has significant implications for cybersecurity, both in terms of enhancing cybersecurity defenses and creating new challenges and risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99487</guid>
      <pubDate>Tue, 01 Aug 2023 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99487-assessing-the-pros-and-cons-of-ai-for-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/07/06/network-g65056e947_1280.webp?t=1698762465" type="image/jpeg" length="362667"/>
    </item>
    <item>
      <title>8 best practices to improve cybersecurity program performance</title>
      <description>
        <![CDATA[<p>Consider these eight cybersecurity best practices when seeking to reduce incidents & material breaches & shorten incident detection & response times.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99326</guid>
      <pubDate>Mon, 03 Jul 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99326-8-best-practices-to-improve-cybersecurity-program-performance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/05/31/security-g4cd2fe6ee_1280.webp?t=1707925818" type="image/jpeg" length="118499"/>
    </item>
    <item>
      <title>Assessments and comprehensive security planning in higher education</title>
      <description>
        <![CDATA[<p>With the growing conversation around school safety, building security solutions within higher education requires detailed planning and routine assessments. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99475</guid>
      <pubDate>Fri, 09 Jun 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99475-assessments-and-comprehensive-security-planning-in-higher-education</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/June/SEC-0623-Edu-Feat-Slide1-1170x658.webp?t=1686342397" type="image/jpeg" length="160805"/>
    </item>
    <item>
      <title>Non-human identities: Secure them now, not later</title>
      <description>
        <![CDATA[<p>Now<em> </em>is the time to secure non-human identities — access tokens, integrations and authentication tools — to prevent future cyberattacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99303</guid>
      <pubDate>Thu, 01 Jun 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99303-non-human-identities-secure-them-now-not-later</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/05/04/robot-gde80d72a8_1280.webp?t=1683230862" type="image/png" length="55196"/>
    </item>
    <item>
      <title>Strategies for implementing proactive &amp; reactive mass notification</title>
      <description>
        <![CDATA[<p>Mass notification systems aid organizational communication with applications in a number of sectors, from university and school communities to healthcare systems.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99342</guid>
      <pubDate>Fri, 12 May 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99342-strategies-for-implementing-proactive-and-reactive-mass-notification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/May/SEC-0523-Edu-Feat-Slide1-1170x658.webp?t=1685110120" type="image/jpeg" length="78382"/>
    </item>
    <item>
      <title>Understanding cybersecurity trends and regulations in a global world</title>
      <description>
        <![CDATA[<span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s global world, it's imperative to be well-versed about cybersecurity trends and regulations beyond the physical boundaries of the organization.</span>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99160</guid>
      <pubDate>Wed, 03 May 2023 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99160-understanding-cybersecurity-trends-and-regulations-in-a-global-world</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/04/06/globe.webp?t=1683336487" type="image/jpeg" length="293154"/>
    </item>
    <item>
      <title>Multi-layered security solutions protect nurses from workplace violence</title>
      <description>
        <![CDATA[<p>Hospitals are wielding new technologies to combat workplace violence, including location tracking systems, duress alarms and visitor management systems.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99210</guid>
      <pubDate>Fri, 14 Apr 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99210-multi-layered-security-solutions-protect-nurses-from-workplace-violence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/April/SEC-0423-Edu-Feat-Slide1-1170x658.webp?t=1682694755" type="image/jpeg" length="82505"/>
    </item>
    <item>
      <title>Understanding cyber risks in the real estate industry</title>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Rigorous cybersecurity practices are a mandatory aspect of real estate business operations. Realtors need to guard against cybersecurity risks and implement comprehensive data security protocols.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99023</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99023-understanding-cyber-risks-in-the-real-estate-industry</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/03/06/real-estate.webp?t=1682694756" type="image/jpeg" length="211662"/>
    </item>
    <item>
      <title>Navigating today’s hotel security challenges</title>
      <description>
        <![CDATA[<p>Surveillance, communication and a balance of overt and covert security are critical tools for hospitality security teams.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98971</guid>
      <pubDate>Mon, 20 Feb 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98971-navigating-todays-hotel-security-challenges</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/Feb/SEC-0223-Edu-Feat-Slide1-1170x658.webp?t=1677287069" type="image/jpeg" length="151539"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/Feb/SEC-0223-Edu-Feat-Slide1-1170x658.webp?t=1677287069" type="image/jpeg" medium="image" fileSize="151539">
        <media:title type="plain">SEC-0223-Edu-Feat-Slide1-1170x658.jpg</media:title>
        <media:description type="plain">FilippoBacci / E+ via Getty Images</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/Feb/SEC-0223-Edu-Slide3-1170x658.webp?t=1676928613" type="image/jpeg" medium="image" fileSize="76984">
        <media:title type="plain">SEC-0223-Edu-Slide3-1170x658.jpg</media:title>
        <media:description type="plain">Hwee-Fong Yong, Safety Manager at Marina Bay Sands. Image courtesy of Hwee-Fong Yong</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2023/Feb/SEC-0223-Edu-Slide2-1170x658.webp?t=1676928628" type="image/jpeg" medium="image" fileSize="57770">
        <media:title type="plain">SEC-0223-Edu-Slide2-1170x658.jpg</media:title>
        <media:description type="plain">Doug Alexander, Director of Security and Loss Prevention at the Grand Hotel. Image courtesy of Doug Alexander</media:description>
      </media:content>
    </item>
    <item>
      <title>Why the cybersecurity talent gap exists and how to solve it</title>
      <description>
        <![CDATA[<p>What is causing the cybersecurity talent shortage, and what can be done to mitigate it? </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98725</guid>
      <pubDate>Thu, 09 Feb 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98725-why-the-cybersecurity-talent-gap-exists-and-how-to-solve-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images_2/cybersecurity-talent-shortage-fp1170b47.webp?t=1671210032" type="image/jpeg" length="118611"/>
    </item>
    <item>
      <title>Think like a cybercriminal: How to strengthen your organization’s security posture</title>
      <description>
        <![CDATA[<p>With malicious actors working to take advantage of human nature, security leaders need to work with their teams to know how to quickly respond when a crisis does strike.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98788</guid>
      <pubDate>Thu, 19 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98788-think-like-a-cybercriminal-how-to-strengthen-your-organizations-security-posture</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/16/dan-nelson-AvSFPw5Tp68-unsplash.webp?t=1674227286" type="image/jpeg" length="77346"/>
    </item>
    <item>
      <title>Building a whole-of-state approach to cybersecurity</title>
      <description>
        <![CDATA[<p>What can U.S. states do to mitigate ransomware and cybersecurity risks? A two-tiered approach that begins with continuous data care best practices and diligent data recovery measures, followed by public and private partnerships is the most successful path.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98656</guid>
      <pubDate>Thu, 05 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98656-building-a-whole-of-state-approach-to-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/federal-state-cybersecurity-fp1170x658c.webp?t=1669233144" type="image/jpeg" length="577425"/>
    </item>
    <item>
      <title>Top benefits of cybersecurity training</title>
      <description>
        <![CDATA[<p>Cybersecurity executives share cyber training techniques they have found impactful in their organizations.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98530</guid>
      <pubDate>Thu, 08 Dec 2022 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98530-top-benefits-of-cybersecurity-training</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/cybersecurity-training-fp1170x658x86.webp?t=1666725710" type="image/jpeg" length="298606"/>
    </item>
    <item>
      <title>Why cyber insurance protection is mission-critical for your business</title>
      <description>
        <![CDATA[<p>The best strategy to keeping cyber insurance premiums manageable is to implement effective <span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">cybersecurity hygiene and data protection practices to protect your enterprise.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98378</guid>
      <pubDate>Thu, 03 Nov 2022 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98378-why-cyber-insurance-protection-is-mission-critical-for-your-business</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/cyber-insurance-fp1170xv45.webp?t=1668111910" type="image/jpeg" length="356231"/>
    </item>
    <item>
      <title>5 questions CISOs should ask when evaluating cyber resiliency</title>
      <description>
        <![CDATA[<p>What are the top five questions chief information security officers (CISOs) should ask when it comes to evaluating and improving cybersecurity resiliency?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98222</guid>
      <pubDate>Thu, 06 Oct 2022 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98222-5-questions-cisos-should-ask-when-evaluating-cyber-resiliency</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/cybersecurity-resilience-fp1170v1.webp?t=1666294050" type="image/jpeg" length="96094"/>
    </item>
  </channel>
</rss>
