<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Magazine</title>
    <description>Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.</description>
    <link>https://www.securitymagazine.com/rss/articles</link>
    <item>
      <title>Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss</title>
      <description>
        <![CDATA[<p>Security leaders share their thoughts on the attack, Iran’s potential involvement and the broader implications. </p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 16:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102306-did-iran-hack-tank-readers-at-us-gas-stations-security-leaders-discuss</link>
      <guid>http://www.securitymagazine.com/articles/102306</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/15/Gas-station-by-Hans-Eiskonen.webp?t=1778875430" type="image/png" length="249372"/>
    </item>
    <item>
      <title>Why Most Workplace Violence Prevention Starts Too Late</title>
      <description>
        <![CDATA[<p>If your people are running, hiding, or fighting, the prevention window has already closed.</p><br>]]>
      </description>
      <pubDate>Fri, 15 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102302-why-most-workplace-violence-prevention-starts-too-late</link>
      <guid>http://www.securitymagazine.com/articles/102302</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Man-with-covered-face-by-Jeremy-Weber.webp?t=1778775586" type="image/png" length="146283"/>
    </item>
    <item>
      <title>2025 Saw a Surge in Wireless Vulnerabilities</title>
      <description>
        <![CDATA[<p>Wireless vulnerabilities rose in 2025.</p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102270-2025-saw-a-surge-in-wireless-vulnerabilities</link>
      <guid>http://www.securitymagazine.com/articles/102270</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News3-Feat-Slide1-1170x658.webp?t=1777322198" type="image/jpeg" length="123566"/>
    </item>
    <item>
      <title>Funding Has Limited Security Readiness</title>
      <description>
        <![CDATA[<p>Limited security funding opens organizations to threat actors.</p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102269-funding-has-limited-security-readiness</link>
      <guid>http://www.securitymagazine.com/articles/102269</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News2-Feat-Slide1-1170x658.webp?t=1777321953" type="image/jpeg" length="125156"/>
    </item>
    <item>
      <title>AI Makes Phishing Scams Harder to Identify in the Workplace</title>
      <description>
        <![CDATA[<p>Phishing grows harder to identify in the age of AI.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102268-ai-makes-phishing-scams-harder-to-identify-in-the-workplace</link>
      <guid>http://www.securitymagazine.com/articles/102268</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News1-Feat-Slide1-1170x658.webp?t=1777321628" type="image/jpeg" length="64207"/>
    </item>
    <item>
      <title>Foxconn Confirms Cyberattack, Security Experts Discuss</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Foxconn confirmed a cyberattack has disrupted some of its North American facilities</span>
</p>]]>
      </description>
      <pubDate>Thu, 14 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102301-foxconn-confirms-cyberattack-security-experts-discuss</link>
      <guid>http://www.securitymagazine.com/articles/102301</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Laptop-and-monitor-by-Glen-Carrie.webp?t=1778773854" type="image/png" length="339529"/>
    </item>
    <item>
      <title>Expert Insights on the West Pharmaceutical Ransomware Attack</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">West Pharmaceutical Services experienced a ransomware incident.&nbsp;</span></p>]]>
      </description>
      <pubDate>Thu, 14 May 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102300-expert-insights-on-the-west-pharmaceutical-ransomware-attack</link>
      <guid>http://www.securitymagazine.com/articles/102300</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Pills-spilled-by-Towfiqu-barbhuiya.webp?t=1778769586" type="image/png" length="221040"/>
    </item>
    <item>
      <title>The Bench You'll Need in Three Years Depends on Decisions You Make Now</title>
      <description>
        <![CDATA[<p>Today’s hiring shortcut is tomorrow’s talent shortage.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 14 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102299</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709" type="image/png" length="302550"/>
    </item>
    <item>
      <title>What Security Leaders Say About the First AI-Developed Zero-Day Exploit</title>
      <description>
        <![CDATA[<p>Security leaders discuss the first AI-created&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">zero-day exploit.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 13 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102298-what-security-leaders-say-about-the-first-ai-developed-zero-day-exploit</link>
      <guid>http://www.securitymagazine.com/articles/102298</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Coding-by-Walkator.webp?t=1778685541" type="image/png" length="846347"/>
    </item>
    <item>
      <title>Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Cybersecurity is no longer a function that can be delegated and reviewed after the fact.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 13 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102297</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Glowing-fibers-by-Luke-Jones.webp?t=1778673918" type="image/png" length="660440"/>
    </item>
    <item>
      <title>Why Security Leaders Need to Move Beyond the Mental Illness Narrative</title>
      <description>
        <![CDATA[<p>For mental health awareness month, Brian LeBlanc highlights why security is pivotal to preventing a crisis in the workplace.</p>]]>
      </description>
      <pubDate>Wed, 13 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102267-why-security-leaders-need-to-move-beyond-the-mental-illness-narrative</link>
      <guid>http://www.securitymagazine.com/articles/102267</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-Edu-Feat-Slide1-1170x658.webp?t=1777320214" type="image/jpeg" length="150576"/>
    </item>
    <item>
      <title>Top 2026 Security Conferences</title>
      <description>
        <![CDATA[<p style="box-sizing: border-box; font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px;"><em style="box-sizing: border-box;">Security&nbsp;</em>magazine offers a roundup of security conferences taking place in 2026.&nbsp;</p>]]>
      </description>
      <pubDate>Mon, 11 May 2026 13:46:26 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102296-top-2026-security-conferences</link>
      <guid>http://www.securitymagazine.com/articles/102296</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/11/SEC_security-conferences-of-2026.webp?t=1778521334" type="image/jpeg" length="178058"/>
    </item>
    <item>
      <title>Digital Trust and Identity at ISC West</title>
      <description>
        <![CDATA[<p>ISC West keynote highlights how gaps across physical access points, digital systems and human processes undermine trust and organizational resilience.</p>]]>
      </description>
      <pubDate>Mon, 11 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102258-digital-trust-and-identity-at-isc-west</link>
      <guid>http://www.securitymagazine.com/articles/102258</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-Talk-Feat-Slide1-1170x658.webp?t=1778688553" type="image/jpeg" length="137583"/>
    </item>
    <item>
      <title>AI Will Tell Your Breach Story for the Next Two Years — Day One Decides What It Says</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Fri, 08 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102295</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Megaphone-by-Igor-Omilaev.webp?t=1778183697" type="image/png" length="664838"/>
    </item>
    <item>
      <title>10 Data Breaches to Know About (April 2026)</title>
      <description>
        <![CDATA[<p>A roundup of recent data breach stories.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 08 May 2026 08:46:58 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102282-10-data-breaches-to-know-about-april-2026</link>
      <guid>http://www.securitymagazine.com/articles/102282</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/Opened-padlock-on-computer-keyboard-by-Sasun-Bughdaryan.webp?t=1777662611" type="image/png" length="307414"/>
    </item>
    <item>
      <title>Partners in Protection: How to Utilize a Canine Security Force</title>
      <description>
        <![CDATA[<p>Organizations of all sizes are looking for innovative ways, including canine teams, to advance their security programs.</p>]]>
      </description>
      <pubDate>Fri, 08 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102256-partners-in-protection-how-to-utilize-a-canine-security-force</link>
      <guid>http://www.securitymagazine.com/articles/102256</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F4-Feat-Slide1-1170x658.webp?t=1778688552" type="image/jpeg" length="88680"/>
    </item>
    <item>
      <title>Research: Microsoft Edge Loads Stored Passwords in Cleartext</title>
      <description>
        <![CDATA[<p>A researcher found that Microsoft Edge will load <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">saved passwords into memory in plaintext, even when they are not being used.&nbsp;</span></p>]]>
      </description>
      <pubDate>Thu, 07 May 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102294-research-microsoft-edge-loads-stored-passwords-in-cleartext</link>
      <guid>http://www.securitymagazine.com/articles/102294</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1778170941" type="image/png" length="282476"/>
    </item>
    <item>
      <title>Will This World Password Day Be the Last?</title>
      <description>
        <![CDATA[<p>Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 07 May 2026 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102293-will-this-world-password-day-be-the-last</link>
      <guid>http://www.securitymagazine.com/articles/102293</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Keys-on-yellow-background-by-Alp-Duran.webp?t=1778167213" type="image/png" length="411957"/>
    </item>
    <item>
      <title>Synthetic Identities Are Redefining Trust in Biometric Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Thu, 07 May 2026 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102291-synthetic-identities-are-redefining-trust-in-biometric-systems</link>
      <guid>http://www.securitymagazine.com/articles/102291</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1778076735" type="image/png" length="201182"/>
    </item>
    <item>
      <title>Security Experts Discuss Proposed Government Patching Deadlines</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 06 May 2026 12:09:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102292-security-experts-discuss-proposed-government-patching-deadlines</link>
      <guid>http://www.securitymagazine.com/articles/102292</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Keyboard-by-ic-Ci.webp?t=1778080922" type="image/png" length="200840"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Need to Think Like Business Leaders</title>
      <description>
        <![CDATA[<p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.&nbsp;</p>]]>
      </description>
      <pubDate>Wed, 06 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102288-cybersecurity-professionals-need-to-think-like-business-leaders</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102288</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516" type="image/png" length="448831"/>
    </item>
    <item>
      <title>5 Skills That Will Serve You in Your Security Career</title>
      <description>
        <![CDATA[<p>An experienced security consultant shares what she has learned as a corporate security executive and as the CEO of a consulting group.</p>]]>
      </description>
      <pubDate>Wed, 06 May 2026 07:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102254-5-skills-that-will-serve-you-in-your-security-career</link>
      <guid>http://www.securitymagazine.com/articles/102254</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F3-Feat-Slide1-1170x658.webp?t=1778688553" type="image/jpeg" length="104457"/>
    </item>
    <item>
      <title>35,000 Users Targeted in Phishing Campaign in Just Two Days</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Between the dates of Apr. 14 and Apr. 16, a sophisticated phishing campaign was observed.&nbsp;</span></p>]]>
      </description>
      <pubDate>Tue, 05 May 2026 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102290-35-000-users-targeted-in-phishing-campaign-in-just-two-days</link>
      <guid>http://www.securitymagazine.com/articles/102290</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Email-app-by-Brian-J.-Tromp.webp?t=1778005568" type="image/png" length="320004"/>
    </item>
    <item>
      <title>Exclusive: What the Celebrity Stalkerware Breach Means for Executive Protection</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine spoke with Cybersecurity Researcher Jeremiah Fowler about the risks of stalkerware in executive protection.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 05 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102289-exclusive-what-the-celebrity-stalkerware-breach-means-for-executive-protection</link>
      <guid>http://www.securitymagazine.com/articles/102289</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Blurry-face-by-Darius-Bashar.webp?t=1777996872" type="image/png" length="370987"/>
    </item>
    <item>
      <title>The Art of Security: It Is Time to Rethink the CISO’s Role</title>
      <description>
        <![CDATA[<p>The CISO’s role, and the cultural and strategic mindset that influences it, must change.</p>]]>
      </description>
      <pubDate>Tue, 05 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102286-the-art-of-security-it-is-time-to-rethink-the-cisos-role</link>
      <guid>http://www.securitymagazine.com/articles/102286</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/Hand-holding-lightbulb-by-lilartsy.webp?t=1777907907" type="image/png" length="297154"/>
    </item>
    <item>
      <title>Sandhills Medical Foundation Notified Individuals of a May 2025 Data Breach</title>
      <description>
        <![CDATA[<p>Individuals were recently notified of a ransomware attack affecting Sandhills Medical Foundation that occurred in May 2025.</p><br><br>]]>
      </description>
      <pubDate>Mon, 04 May 2026 15:01:57 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102287-sandhills-medical-foundation-notified-individuals-of-a-may-2025-data-breach</link>
      <guid>http://www.securitymagazine.com/articles/102287</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/philipp-katzenberger-iIJrUoeRoCQ-unsplash-(6).webp?t=1777921235" type="image/jpeg" length="72549"/>
    </item>
    <item>
      <title>The Coming Wave of Large-Scale Al-Enabled Cyberattacks</title>
      <description>
        <![CDATA[<p>The first truly major AI-enabled cyberattack will look different from the incidents that dominate headlines today.</p>]]>
      </description>
      <pubDate>Mon, 04 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102281-the-coming-wave-of-large-scale-al-enabled-cyberattacks</link>
      <guid>http://www.securitymagazine.com/articles/102281</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/Coding-on-laptop-by-Ilnur.webp?t=1777647542" type="image/png" length="414130"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Sentenced to Prison for Ransomware Attacks</title>
      <description>
        <![CDATA[<p>Two cybersecurity professionals were imprisoned for their role in a string of 2023 ransomware attacks.&nbsp;</p>]]>
      </description>
      <pubDate>Mon, 04 May 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102285-cybersecurity-professionals-sentenced-to-prison-for-ransomware-attacks</link>
      <guid>http://www.securitymagazine.com/articles/102285</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/Gavel-by-Sasun-Bughdaryan.webp?t=1777904232" type="image/png" length="307749"/>
    </item>
    <item>
      <title>Instructure, Parent of Canvas, Confirms Data Breach</title>
      <description>
        <![CDATA[<p>Instructure recently confirmed its data was stolen.&nbsp;</p>]]>
      </description>
      <pubDate>Mon, 04 May 2026 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102283-instructure-parent-of-canvas-confirms-data-breach</link>
      <guid>http://www.securitymagazine.com/articles/102283</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/Elementary-school-supplies-by-Element5-Digital.webp?t=1777899724" type="image/png" length="290403"/>
    </item>
    <item>
      <title>Inside the Modern Warehouse: Securing the World’s New Front Door</title>
      <description>
        <![CDATA[<p>Through perimeter protection, layered safety measures and systemic security, security leaders can protect an essential element of the supply chain: warehouses.</p>]]>
      </description>
      <pubDate>Mon, 04 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102252-inside-the-modern-warehouse-securing-the-worlds-new-front-door</link>
      <guid>http://www.securitymagazine.com/articles/102252</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F2-Feat-Slide1-1170x658.webp?t=1778688552" type="image/jpeg" length="194811"/>
    </item>
  </channel>
</rss>
