This feed does not validate.
In addition, interoperability with the widest range of feed readers could be improved by implementing the following recommendations.
<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>Security Newswire</title>
<description>
<![CDATA[Daily news stories from around the world for the security executive. ]]>
</description>
<link>https://www.securitymagazine.com/rss/2189</link>
<language>en-us</language>
<item>
<title>Verizon 2024 Data Breach Report shows the risk of the human element</title>
<author></author>
<description>
<![CDATA[<p>The 2024 Data Breach Investigations Report reveals the role that the human element plays in cyber threats, and security leaders are weighing in. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100629</guid>
<pubDate>Fri, 03 May 2024 12:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100629-verizon-2024-data-breach-report-shows-the-risk-of-the-human-element</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/02/Glowing-blue-fibers-in-darkness-UNSPLASH.png?1714660720" type="image/png" length="381817"/>
</item>
<item>
<title>Report: The cost and complexity of data compliance impedes innovation</title>
<author></author>
<description>
<![CDATA[<p>Organizations are utilizing data to promote innovation; however, less than 2% can access sensitive data within a week’s time. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100627</guid>
<pubDate>Fri, 03 May 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100627-report-the-cost-and-complexity-of-data-compliance-impedes-innovation</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/02/Business-meeting-UNSPLASH.png?1714658151" type="image/png" length="405130"/>
</item>
<item>
<title>95% of organizations adjusted cybersecurity strategies this past year</title>
<author></author>
<description>
<![CDATA[<p>A new report shows that within the last 12 months, a majority of organizations reworked cybersecurity strategies. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100624</guid>
<pubDate>Thu, 02 May 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100624-95-of-organizations-adjusted-cybersecurity-strategies-this-past-year</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/01/Two-women-working-at-a-desk-UNSPLASH.png?1714748913" type="image/png" length="510340"/>
</item>
<item>
<title>Ransomware gang RAGroup activities increased by more than 300%</title>
<author></author>
<description>
<![CDATA[<p>New data analyzing ransomware group activities has found that activity from the ransomware gang RAGroup has risen by 300% since December. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100619</guid>
<pubDate>Wed, 01 May 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100619-ransomware-gang-ragroup-activities-increased-by-more-than-300</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/30/Red-and-black-electronic-chip-UNSPLASH.png?1714482448" type="image/png" length="549242"/>
</item>
<item>
<title>Security’s Top 5 – March 2024</title>
<author></author>
<description>
<![CDATA[<p>In this edition of Security’s Top 5 from Security magazine, we showcase the top stories and new developments from across the security industry throughout March.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100622</guid>
<pubDate>Wed, 01 May 2024 00:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100622-securitys-top-5-march-2024</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/secenews/SEC-March-Top-5-Title-Screen-.jpg?1714748913" type="image/jpeg" length="410642"/>
</item>
<item>
<title>There was an 81% year-over-year increase in ransomware attacks</title>
<author></author>
<description>
<![CDATA[<p>An evaluation of nearly 4,900 ransomware attacks reveals information about malicious actors and their new techniques, their evolving operations and their global impact. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100618</guid>
<pubDate>Tue, 30 Apr 2024 12:00:53 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100618-there-was-an-81-year-over-year-increase-in-ransomware-attacks</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/29/Half-open-laptop-in-blue-UNSPLASH.png?1714399921" type="image/png" length="286898"/>
</item>
<item>
<title>Poor cyber hygiene and budgets leave organizations ill-prepared</title>
<author></author>
<description>
<![CDATA[<p>Many organizations are vulnerable to risk, yet a majority of cyber leaders express confidence that their organization can manage risk. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100617</guid>
<pubDate>Tue, 30 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100617-poor-cyber-hygiene-and-budgets-leave-organizations-ill-prepared</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/29/Person-with-laptop-and-calculator-UNSPLASH.png?1714398013" type="image/png" length="483997"/>
</item>
<item>
<title>Experts weigh in on the MITRE nation-state cyberattack </title>
<author></author>
<description>
<![CDATA[<p>MITRE Corporation announced that it was the target of a nation-state cyberattack, and security leaders are sharing their insights. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100616</guid>
<pubDate>Mon, 29 Apr 2024 12:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100616-experts-weigh-in-on-the-mitre-nation-state-cyberattack</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/26/Gloved-hands-typing-on-a-lapop-UNSPLASH.png?1714142665" type="image/png" length="329105"/>
</item>
<item>
<title>Emerging national security threats</title>
<author></author>
<description>
<![CDATA[<p>Felipe Fernandez, Chief Technology Officer at Fortinet Federal, discusses the challenges and opportunities for enterprise security professionals in the scope of national security. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100611</guid>
<pubDate>Mon, 29 Apr 2024 09:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100611-emerging-national-security-threats</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/24/Fernandez-Security-podcast-news-header.png?1713982400" type="image/png" length="88710"/>
</item>
<item>
<title>Experts weigh in on Omni Hotel ransomware incident</title>
<author></author>
<description>
<![CDATA[<p>Omni Hotels & Resorts was the recent target of a ransomware attack by the Daixin Team ransomware group.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100605</guid>
<pubDate>Mon, 29 Apr 2024 08:26:44 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100605-experts-weigh-in-on-omni-hotel-ransomware-incident</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/23/Hotel-resort-UNSPLASH.png?1713882670" type="image/png" length="653035"/>
</item>
<item>
<title>Security leaders respond to disruption of LabHost, a fraud website</title>
<author></author>
<description>
<![CDATA[<p>LabHost, a notable phishing-as-a-service platform, was disrupted by international investigations. Security leaders respond. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100606</guid>
<pubDate>Mon, 29 Apr 2024 08:06:45 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100606-security-leaders-respond-to-disruption-of-labhost-a-fraud-website</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/24/Glowing-police-siren-UNSPLASH.png?1713966152" type="image/png" length="267875"/>
</item>
<item>
<title>72% of CISOs believe AI solutions may lead to security breaches</title>
<author></author>
<description>
<![CDATA[<p>A new report surveyed more than 400 CISOs from the United States and the United Kingdom to gauge their challenges, priorities and initiatives. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100615</guid>
<pubDate>Mon, 29 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100615-72-of-cisos-believe-ai-solutions-may-lead-to-security-breaches</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/26/Laptop-in-a-dark-room-with-coding-on-screen-UNSPLASH.png?1714140974" type="image/png" length="313733"/>
</item>
<item>
<title>93% of security leaders anticipate daily AI attacks by 2025</title>
<author></author>
<description>
<![CDATA[<p>Security leaders predict that AI will become a more prevalent tool in the tool kit of cybercriminals, potentially powering a range of cyberattacks. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100613</guid>
<pubDate>Fri, 26 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100613-93-of-security-leaders-anticipate-daily-ai-attacks-by-2025</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/25/Computer-chip-with-AI-printed-on-top-UNSPLASH.png?1714054794" type="image/png" length="856298"/>
</item>
<item>
<title>The real space race: Inside geopolitics and security of a $1.8T industry</title>
<author></author>
<description>
<![CDATA[<p>In episode 22 of the Cybersecurity & Geopolitical Discussion, our trio of hosts debate the geopolitical and security dimensions of the current global space industry. </p><br>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100594</guid>
<pubDate>Thu, 25 Apr 2024 10:30:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100594-the-real-space-race-inside-geopolitics-and-security-of-a-18t-industry</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/09/SEC-0223_Podcast-Promo-Banner_900x550.jpg?1704834806" type="image/jpeg" length="118720"/>
</item>
<item>
<title>FTC issues refunds to Ring customers following privacy settlement</title>
<author></author>
<description>
<![CDATA[<p>The FTC issues refunds after a settlement with Ring over charges the company allowed employees and contractors to access consumers’ private videos.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100607</guid>
<pubDate>Thu, 25 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100607-ftc-issues-refunds-to-ring-customers-following-privacy-settlement</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/24/alan-j-hendry-KNt4zd8HPb0-unsplash-(1).jpg?1713968976" type="image/jpeg" length="106498"/>
</item>
<item>
<title>73% of security professionals failed to act upon security alerts</title>
<author></author>
<description>
<![CDATA[<p>Many small and medium-sized enterprises lack the resources and abilities to properly handle the large volume security alerts received. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100610</guid>
<pubDate>Wed, 24 Apr 2024 13:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100610-73-of-security-professionals-failed-to-act-upon-security-alerts</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/24/Meeting-with-laptop-UNSPLASH.png?1713975644" type="image/png" length="477549"/>
</item>
<item>
<title>40% of organizations have AI policies for critical infrastructure</title>
<author></author>
<description>
<![CDATA[<p>According to a recent study, 80% of cybersecurity decision makers say accelerating AI adoption is critical to their organization’s resilience.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100603</guid>
<pubDate>Wed, 24 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100603-40-of-organizations-have-ai-policies-for-critical-infrastructure</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/23/steve-johnson-_0iV9LmPDn0-unsplash.jpg?1713883893" type="image/jpeg" length="176509"/>
</item>
<item>
<title>New research discovers vulnerability in an archived Apache project</title>
<author></author>
<description>
<![CDATA[<p>Research has discovered a vulnerability in an Apache project that could lead to remote code execution inside of the production environment. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100599</guid>
<pubDate>Tue, 23 Apr 2024 12:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100599-new-research-discovers-vulnerability-in-an-archived-apache-project</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/22/Silhouette-of-woman-at-computer-UNSPLASH.png?1713794357" type="image/png" length="376583"/>
</item>
<item>
<title>88% of respondents will focus security investments on cloud security</title>
<author></author>
<description>
<![CDATA[<p>According to a recent cybersecurity priorities report, security analysts maintain that up to 57% of their daily tasks could be automated.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100602</guid>
<pubDate>Tue, 23 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100602-88-of-respondents-will-focus-security-investments-on-cloud-security</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/22/christian-mackie-lDlU1zbjGQA-unsplash.jpg?1713807378" type="image/jpeg" length="103356"/>
</item>
<item>
<title>66% of IT leaders doubt the government can defend against cyberwarfare</title>
<author></author>
<description>
<![CDATA[<p>In a recent report, two-thirds of IT leaders express a lack of confidence in the United States government's ability to defend against cyberwarfare.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100593</guid>
<pubDate>Fri, 19 Apr 2024 12:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100593-66-of-it-leaders-doubt-the-government-can-defend-against-cyberwarfare</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/18/Three-people-fighting-for-envelope-UNSPLASH.png?1713453081" type="image/png" length="512924"/>
</item>
<item>
<title>Report finds a near 20% increase in ransomware victims year-over-year</title>
<author></author>
<description>
<![CDATA[<p>The number of victims experiencing ransomware incidents has risen since Q1 of 2023, rising by nearly 20% by Q1 of 2024. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100592</guid>
<pubDate>Fri, 19 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100592-report-finds-a-near-20-increase-in-ransomware-victims-year-over-year</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/18/Laptop-in-a-dark-room-with-coding-on-screen-UNSPLASH.png?1713449237" type="image/png" length="313733"/>
</item>
<item>
<title>Pentesting accounts for an average of 13% of total IT security budgets</title>
<author></author>
<description>
<![CDATA[<p>A recent report has emphasized the prevalence and importance of pentesting among enterprise security teams. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100588</guid>
<pubDate>Wed, 17 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100588-pentesting-accounts-for-an-average-of-13-of-total-it-security-budgets</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/16/Half-open-laptop-in-blue-UNSPLASH.png?1713280139" type="image/png" length="286898"/>
</item>
<item>
<title>Nevada loses the most money to cybercrime</title>
<author></author>
<description>
<![CDATA[<p>The widespread financial burden of cybercrime in the U.S. was recently analyzed by NoDepositRewards using data from the 2023 FBI crime report.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100587</guid>
<pubDate>Tue, 16 Apr 2024 10:07:38 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100587-nevada-loses-the-most-money-to-cybercrime</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/16/rivage-822R9uVlYMI-unsplash.jpg?1713275635" type="image/jpeg" length="52152"/>
</item>
<item>
<title>Report finds that only 5% of businesses have a cyber expert</title>
<author></author>
<description>
<![CDATA[<p>Although cybersecurity is vital to an organization’s financial success, many companies do not have a designated cyber expert. </p><br>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100559</guid>
<pubDate>Fri, 12 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100559-report-finds-that-only-5-of-businesses-have-a-cyber-expert</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/01/Office-with-workers-on-computers-UNSPLASH.png?1711988714" type="image/png" length="453659"/>
</item>
<item>
<title>Kristine Raad joins General Motors as Chief Security Officer</title>
<author></author>
<description>
<![CDATA[<p>Kristine Raad has announced a new position as a Chief Security Officer at General Motors.</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100563</guid>
<pubDate>Fri, 12 Apr 2024 00:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100563-kristine-raad-joins-general-motors-as-chief-security-officer</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/02/Cropped-Bio-Pic---K-Raad.jpg?1713562218" type="image/jpeg" length="73465"/>
</item>
<item>
<title>A vulnerability in Linux distributions may allow unauthorized access </title>
<author></author>
<description>
<![CDATA[<p>A recently detected vulnerability in many Linux distributions may open the door for malicious actors to gain unauthorized access. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100558</guid>
<pubDate>Thu, 11 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100558-a-vulnerability-in-linux-distributions-may-allow-unauthorized-access</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/01/Phone-with-lock-on-screen-UNSPLASH.png?1711986978" type="image/png" length="421199"/>
</item>
<item>
<title>Security leaders weigh in on the White House's order regarding AI</title>
<author></author>
<description>
<![CDATA[<p>The White House held a press call in regard to the federal government's approach to AI, and security leaders are sharing their thoughts. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100557</guid>
<pubDate>Wed, 10 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100557-security-leaders-weigh-in-on-the-white-houses-order-regarding-ai</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/01/The-capitol-building-from-the-street-UNSPLASH.png?1711985263" type="image/png" length="693184"/>
</item>
<item>
<title>51% of check fraud victims had been targeted two or more times</title>
<author></author>
<description>
<![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Almost a third of Americans surveyed (31%) admitted to either not following best practices to avoid check fraud or being unsure whether they do so. </span>
</p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100582</guid>
<pubDate>Tue, 09 Apr 2024 13:49:31 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100582-51-of-check-fraud-victims-had-been-targeted-two-or-more-times</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/09/money-knack-KkV-GYUCZf4-unsplash.jpg?1712684823" type="image/jpeg" length="82462"/>
</item>
<item>
<title>Security leaders discuss the U.S. Treasury's concerns regarding AI</title>
<author></author>
<description>
<![CDATA[<p>The U.S. Department of the Treasury released a report regarding cybersecurity threats in the financial sector, specifically related to AI. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100579</guid>
<pubDate>Mon, 08 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100579-security-leaders-discuss-the-us-treasurys-concerns-regarding-ai</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/05/Pile-of-money-UNSPLASH.png?1712326852" type="image/png" length="688071"/>
</item>
<item>
<title>Talent shortage is leading to automation and outsourcing</title>
<author></author>
<description>
<![CDATA[<p>A new report discusses trends in automation and outsourcing within IT teams. </p>]]>
</description>
<guid>http://www.securitymagazine.com/articles/100572</guid>
<pubDate>Fri, 05 Apr 2024 08:00:00 -0400</pubDate>
<link>https://www.securitymagazine.com/articles/100572-talent-shortage-is-leading-to-automation-and-outsourcing</link>
<enclosure url="https://www.securitymagazine.com/ext/resources/2024/04/04/Silhouette-of-woman-at-computer-UNSPLASH.png?1712238442" type="image/png" length="376583"/>
</item>
</channel>
</rss>